ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-586560295414
|
Infrastructure Scan
ADDRESS: 0x81580fdc3f4b5323f4860d789c7ba290991afaaf
DEPLOYED: 2026-05-13 09:19:59
LAST_TX: 2026-05-13 17:42:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connection established. Peer count: 12. [FETCH] Hex dump completed. Entropy: 9.83 bit/byte. [SCAN] Mapping ownership-protected functions… [MEM] Simulation buffer: 1024 KB allocated. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Balance check: 9.79 ETH. [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Consensus reached on node cluster: 3/10. [DONE] Triada-Engine standby mode. Load: 2%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x80978300e4e1b76706295654b834ba4b2ae4e8e2 0x2e32b356829ee722dfc3a83d0e8370433ec352ec 0x5ca362b092b670da1e5e826d9ae714254e5797de 0x7732a4e6ba1b8c8eb3174a0fd50ce0b1fbd2a326 0x22991089e55d47683c89f813bf927670d37754fb 0xc1e184ba7aaeec1249fe0bbf3eb4c8281e1b17ea 0xb977945cf4219c00385dc8ee39c53a825ec79ae1 0x0086a9219f85f13d234f14324e5d4640b8f2f195 0x75c711f5db0a354993c280c54454010de36c8e39 0xb2c7aec0b8d6e8ef3205bb2e114657ddbd91adf3 0x7a47c303cb2ee3b7d93b1d895ed46472d1dd2a46 0x9cdc2d926f90c4dfd38c245f45c33c9477ce787e 0x93db4e5683a02a35bf7be953ccca22c452eb7248 0x9330334e9590d373f819fdb023d0476aef621118 0x551fcd49a07e065dfa3fb7dd62e853ff0851f115 0xb353570094fce0df896f2fae530b8418eed55cd7 0x1ef5ef19044c2ccb55affc1099801ff907e51270 0x944c1558c9ae5c375ff5f0d53c25f1453d1fdc32 0xbdcb788572eaa9389f8b74699ead642e78e243c9 0x6fc878c79ba49300724e9e1f3c3db3bb2d74f94b
