ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-1936D5CF6A79
|
Infrastructure Scan
ADDRESS: 0x95b31ee9752d4a581eda4920aac3b48b60816ba7
DEPLOYED: 2026-05-13 05:16:59
LAST_TX: 2026-05-13 06:31:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Handshake with node 0xcb786c3a successful. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Analyzing visibility: 8 public, 6 private methods. [MEM] Clearing temporary registers for deep-trace… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Simulation completed. No state corruption detected. [TRACE] Program Counter (PC) synchronized at 3140. [VALID] Finalizing audit report for 0x95b31ee9752d4a581eda4920aac3b48b60816ba7. [DONE] Triada-Engine standby mode. Load: 4%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xd4c5bcea8b4da57201bb9187ab1c04fa1ac58b31 0xa2447b2962f916da6172d58c31b27f44abe1ea38 0xead72200018ad3eccfddb5b646e804461ee39e8d 0x1ef2665363fc7adc6f7d829a39e3d4544b2e9e0f 0x92f6b3719fa86d0e48c3e6ca039dc9fc29c79470 0x728165a5c727c5823f48f9b7ee0fe519796f6071 0x7fd54f55fa79ab9dc2865d24abfddba44b1ee4a9 0x98b09c01f648c76fa1c75fd7991d2df6faa98a8e 0xb3596c4f1fd669d017f76dbfbe1fd1c99f856168 0x5219d4d59d729e385514af2cef24b3fdf53c38f8 0xaa5d6094f2fcc543e70ca586b005934ace95f212 0xd5a179e7a41b8a07bf98ae00322fc1bdab4925d6 0x544a849a4aac0ef2501a2d31094f3117b9beb0f8 0x8246896a8170df004c349f2ab98a60cf39b3c63c 0x105045a0d867818e4bc370de8fcc305ee74a68ba 0xca7d1db3589fccf3df1bc6f37033ed84bb54cc5e 0xd7e20b23868c0abaebdced67fab10a4b0df5ab73 0x171e5293a3cf53c7c8733f643ed51b6873304e8e 0xe7eab9433328fd637cf1e3fff2933d2448abcb13 0x227bba34a4a9356f3b1c0cb5d66248c84b89ae03