ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-FF60316274A6
|
Infrastructure Scan
ADDRESS: 0xf37fa2c46eea1f068f0b5790ae2897d2ab9c1b0a
DEPLOYED: 2026-04-30 13:21:47
LAST_TX: 2026-04-30 22:30:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
â—ˆ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Mapping peer nodes for transaction trace… [FETCH] Entry point found at offset 0xe0b5. [SCAN] Running static analysis on JUMP instructions… [MEM] Clearing temporary registers for deep-trace… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Balance check: 8.40 ETH. [TRACE] Debug: e431abacf4ebfdae. [VALID] Finalizing audit report for 0xf37fa2c46eea1f068f0b5790ae2897d2ab9c1b0a. [DONE] Log signature: 47b5bcdca9954a984d1d3d2a69266d15a56ff954deff471e6d87ce3c439cf9c6.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xc725300c68b00f2f142675ad812b2c7d7730fd80 0xf94ee617743f27fa8de0ad4b4767ec8fb902d39e 0x9760752276d45deaeb23007a0e77a41e74a0c057 0xc9cb8daf5e26100749505ac815a020df892a7080 0x6f8df56d7b4ab6f93f913e888d913ada22f3f8a7 0x8e1f3d8453575e5e744c3aab3aa8005f9981f81b 0x02e4b7580a62c6e2af0db4e86c1dc7fe8d15b9b0 0x88909399291d7845f2dd6abcd05f5bd3caf49598 0x8314208ee429f5664c92a09c098416d0ed77cdce 0x678579b4cdf41aaf14cf47ce3a385c768d009aef 0x1fb67d150c1b66a4478c79accc84292a298e6f36 0xf4f8c0809bba79583fb0b968ab2abbfa0a9887ed 0x52b1520775c07a73dd62c60a3b3f6b9fa1d46a2a 0x439d4f10dc13f57ba402ad72e7813625b6b0b3f1 0xcd406cbd329f853c92240e69d5611dc0eafa9314 0x900c73b3cad6520bd2042d5a53a622afb31c513f 0xbfbd8fb47a71c2e295de452e9346f90252dae2e5 0xc2e0c1aa26b038eaf9e5f313065a9b5221d530e8 0x03f57d301c7d8039ec52133cb373c758ed6b02a1 0xf3d2adc5e08d9708355dce120a2e486144f6b143
