ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-6AAB282CB450
|
Infrastructure Scan
ADDRESS: 0xabe547b26b502b6086dde3faa68c015a9b276bf0
DEPLOYED: 2026-05-13 07:54:35
LAST_TX: 2026-05-13 08:23:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
? OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Reconstructing ABI from function selectors… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Tracking pointer 0x90847257 in memory heap. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Testing edge case: Zero-address transfer… [TRACE] Return data: 0xfaa3680c… [VALID] Comparing result with Triada-Security-Standard. [DONE] Scan task 92935A51 finished in 41s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x71973615af388db94d376946d479ae0571c3dfa3 0x77dce428cc57d942d2c822ae9223f7b29c493251 0x25eb763738ac0c87b4410329d879c176437bee9b 0x5654850055206d502670306ff3f3ac2be91bf92a 0xcdacf938100f0d3d2fe0a3c909d329d75b37183f 0x0f6645fecabc7a5053d690dcf785c55ce4ea1675 0xf22e5dc386942f5596ff81f0a41aa2fccba0c8cf 0xaba102b5579ea9e64b93825adcb056686dfe96d0 0x7d97753817a224306123186bd417827e7b23fbdb 0x1749bfb932ec8dfead2dd4759113bf5f45502250 0x0efad9d6a459960a929d9d85f976dcd4cbd95b3f 0x1f01d83dcfca26e1df9e194051a6354fd6f7d57e 0x988c1f2e988bf168d81210d540e1bac5497ee99f 0xc02a1e3e7488bbcb461ecbf62ec622ab79153801 0xad46c3c3648fe43c0693bf6514970d010e51b51b 0xbf14077587ffa666e3e2e320804c98a778fb1078 0x9cc0e9d3837c97d2c3ec1324781cf75e7136a52b 0xfe9d6e40e96a9d93e2a60b776821041a3f668a89 0x8f5f500bd901a07f8ba3ace977566610a3c33b2d 0x8059a65ebdf92b59cc3bcfa7511043ba37013ab2