ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-52BC1B0C42CE
|
Infrastructure Scan
ADDRESS: 0x56d06158bb8d2e42a6c5994a9a12a5c6d642f064
DEPLOYED: 2026-04-26 10:28:11
LAST_TX: 2026-04-30 19:57:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Connection established. Peer count: 37. [FETCH] Received 73 segments of contract data. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Garbage collector: 0.11ms since last run. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] State change detected in slot 0x64. [TRACE] Stack trace saved to /logs/TRD-66ABD056.log. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x58154d2e99c41319c28e5980eb36a298d63d9279 0x63c81876aed879c048db6388ec51ccf43559a1ef 0xcead4bf9859062d32b6a72bf0f697fe4d601db3c 0x7fae36f1c07b8317c3922843d698453393032776 0xf5be837f1e73ab0b7177062ad7efdd313a3019cb 0x052ec8461f2d06871df69cce7d88495245ecf6bc 0x0aa04ca6f487d4061a784bcfa38364bfc28b4b74 0x1c9d7c53ab7f3fd1aa02cef173906980a875aa48 0x17035c7632a5edcc64f630ddcb56df31fb594d85 0xfa71992b70d9ae7d563bd1a11ccc442f0426106c 0x7691a1a00e45c8b0c88e103e9ab85729d20d5dbe 0xb54296dc5b14360014f5b9aec5687dd68318a413 0x28849ec4f8c9ffe8f895c1fec465c43788e4d8b2 0x58eec8f4184876a06db9d4e45c5426f01bf4188c 0xfe8f9c4b24bbd0ce74cee60f5d8b44f616f748d4 0x461307aba19ded3b06dcd19c6adc240a259c110b 0xbd7b6961c2c1d808089d5349ce2b1b58e68d71ee 0x19d27a0468e8b2c63ad417d2545aea48de5c41a4 0x75461e8713182e65a0e13abe95bfbc1c735901cd 0x7bf1b7c35c2cc51c961a5e22f0d70f1952e22f99
