ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-FA1585CBFAD2
|
Infrastructure Scan
ADDRESS: 0x8a81e17817bdadca64dd4403b246a7dda624c8aa
DEPLOYED: 2026-05-11 05:13:35
LAST_TX: 2026-05-11 05:38:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Fetching raw bytecode for 0x8a81e17817bdadca64dd4403b246a7dda624c8aa… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Identifying function signatures (0x82739e62). [MEM] Stack depth: 5 / 1024. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Mocking MSG.SENDER as 0x5210ee732b6e8131dd6a9cbbea7e2807db17f406. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xadd3002e63518ad63b028413cbdad4fcd223ad83 0xb35a5076e8011082bf5ddaf3c58f1c711ba422cd 0x1e60a06f2c04f6569f7b511422a2bb73acfa4083 0x0a40cb6230fa0c1f135ea7711987781799041098 0x1a1d90fd0266a28fa1d283d51bd6ccce079b91c9 0xda49320a170346c3fc6fb6c772b3f0d53485f82a 0xc01ed9e31bec228d307a7e24aee190783be128bf 0x25ff290edb1c1837cde76a8db99f62be6e7d9aa9 0xcc5d944aa9b7c9937e49a3f001545b7e215f2772 0xca264a16fc1be68fc4c6c4aef17a1014991dbb31 0x11025257e5b0f1377df155eeb494a112d7452acd 0xac871dc6429fbf1a0c17ccbe2af575f56ad0a172 0x48230bba37d256a23f5b447a81a58cdf4050b2d3 0x5d8c86e75bf21a2b9cb87006dadbe2665470a587 0x4c20ca379c108d5f844ebbb0a98db020d8124a6d 0x1b256ecf88322a4fd8ddb1498262fab99f6982db 0xb7614e26a8a3f14432db4e00926b3b55a3b28850 0x3c10cb29bee689589c42f3667bb10ad6f550ee0b 0x52ed24da4e57dc570a000d0bc196e3c115cd896d 0x76e6df9ff9bd0bf5fb7015d78a55bc24ecc065a3
