ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-6540B3691CBC
|
Infrastructure Scan
ADDRESS: 0xeb15cd464bb2622daff6a1d89fbc994a5ec32d0d
DEPLOYED: 2026-05-10 00:46:47
LAST_TX: 2026-05-10 01:09:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Latency: 66ms. Protocol: JSON-RPC 2.0. [FETCH] Reconstructing ABI from function selectors… [SCAN] Running static analysis on JUMP instructions… [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Reverting transaction at PC: 3650… [TRACE] Debug: 83740de961f59629. [VALID] Generating cryptographic proof of scan… [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x1aae4002c5cf6d5a549561f98a3a2fcd77b3c9ff 0x9349fddb26df0d1b20034c352ebd2b5545b1aa8b 0x64244485a272f04603ae346d2e99d440825deb0a 0x5943972c9f4f94bb9b624291402faf5b65afd5bd 0x5506adbcae39cb64a65cd93e64122e82535b8540 0x536e79cf5f5d3f4954956baea5499f715bc52b57 0xab1cdf7597ac9e962f02f7fbb0968be632b28edc 0x1a360e742d7bb571e64bf3c8641ef100903f8519 0x7462b70bb5603a14adb7209aec2ed594358a4912 0x3dae591aff6eb8a54b5f5ad3c134912c086f081b 0xc6f6db02d54e48a0a640b0279fb78aa31e3338ce 0x9cf9c8ea737a7d5157d3f4282ace30880a7a117c 0x404b0119ee0586dac56444dd4281a0279b443082 0x67fc041616e4e0fcca9eb090f5ea61f96151d0f2 0xeb67327e6a102e048a3c2fef299eefaab21719f6 0x1f1143abe64b58359f74069e0f7e6bb436f4de40 0x7517bd451e77e3935a1eb401867d08b08ee7a117 0x6d4a595d725ffc688f4048694e6279185d13a304 0x1887a01437ddbee7dc7cfda666eefad441d671bd 0xbebeccd35dd93c9639aad47d9ba0596dfdcad7c6