ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-41235F038BE3
|
Infrastructure Scan
ADDRESS: 0x09a0044f60c48937dcd40f8702d0319469a16a0e
DEPLOYED: 2026-05-14 04:08:35
LAST_TX: 2026-05-14 04:43:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Core initialized. Checking license for cluster-node-2. [NET] Pulling contract state from Alchemy RPC… [FETCH] Received 78 segments of contract data. [SCAN] Running static analysis on JUMP instructions… [MEM] Simulation buffer: 1024 KB allocated. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Simulation completed. No state corruption detected. [TRACE] Call sequence: 2221 -> b71a -> 9a1a. [VALID] No critical memory leaks during simulation. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xc3868ac63ec93f99b9bdac15f9ed3c772e2c5800 0x9683abb6bfbe37d398c2c1c8aa059ddfba974750 0xfd650eb4ae116a527077a7a0b44f37462578cb37 0xb9c5c6e13f08a8a3fac6218a6c0e245ed97a2d15 0x0df0d09e407a0098be433e4934601693832ef4b9 0x6330fd760bd922fcdf03b10bd32f48aa7e3d1ad9 0x0d580336f376a8cbdeea4767bd50412cff636421 0x3fd8761c5e99e2a30aff68ea9037c6bf931454e3 0x8b969afce2678cab55514d8cff89eb7cc8940fb7 0xa0befca69b9fcc0a6db4fa8147368123f3656c59 0x9ecdb0050cccd0f5f8d7d2bf1cb7bc857e9b26d1 0xaa2594cc393ac85bac047fb3c794c6df66896b4f 0xd047db68140bf42107e36f1bf1544388929a8f58 0xaba102b5579ea9e64b93825adcb056686dfe96d0 0x1305ea504a56ce97d218868de73e05e3e21a52f9 0xb12af17526d5b85932aecedad93399c825148cd4 0x8536281d3372525a9d8e073faee882ede6553b16 0xbe329eb76d7b13949b455a2330ef1a45e4c10440 0x2e23df2f13d01c1b33488ccc86e8869e7bcb0949 0x4e5c3a662cc6edc8f3b741d6f8791343a9c7f7ee
