ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-72A2716EC5D5
| Infrastructure Scan ADDRESS: 0x952a767d97afda842ef3f8395da9356cd7ac359a DEPLOYED: 2026-05-10 09:42:35 LAST_TX: 2026-05-10 11:34:59 | Compliance Status STATUS: OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling VISIBILITY: ELEVATED_PRIVILEGE_RISK |
◈ OWNER_PRIVILEGE_EXPOSURE An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! | > Execution_Trace_Log [SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Requesting storage slots for offset 0x00… [FETCH] Entry point found at offset 0x1393. [SCAN] Checking ‘immutable’ variables and constants… [MEM] Allocating stack frame for EVM simulation… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Fuzzing input data for 79 iterations. [TRACE] Execution path: 78% coverage. [VALID] Security status: DEEP_CORE scan finished. [DONE] Memory buffer cleared. Session closed. |
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x87a07e94cafc17a1ba92c9e2e129b54aee7e6f91 0xae669af7e3f84aced3b85b9c77f0232ebfeceb27 0xfe5ab8e23e0e9a7fe61f92d686e7594625c1752e 0xe9fbc38338e1a27ebac009e6b3e4d8fa862f7d3a 0x53b070ad0d326fa41effb552be9b1504edfcbae6 0xfddf3ba464fbf4c033f6cacebfc3286a7887df9c 0x8318e2662d82771387f54b80fbcbb5f193ac473b 0xc39155359ea8c9cd44b6e5df46e0f9fe07b3856f 0x4d24cf2cf50a597221f1386cdb741148cb3e39fb 0x0d1dede6210335b4e76530ce8e6fee802029344a 0x7b03fc698e790dd84cb18cd952fa9d023a90a83d 0xb20c237ce70294b3ee8d924784ba89b8ea2cb438 0x14bf4cfd175fa0db6deb2c099a24c2a4c78964b1 0x799ae520ca78dbd40a67cc6eef1938c99dce9723 0x30e31116b05928f1d53e848f73d871237a43c9b1 0x35a6a3b955883756e301d2f1da191c35fcb209fa 0xed1a05605a6b11362b1ed6634e959ff146c98cb5 0xd0ed2d8c3d7ddf2afd0efb68211431d151ceda4d 0xfa5a9a03097f421e45df7a55e58060f1ffe26971 0xecdda744eebc50d08d415498683e38032f2c77c1