ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-41A9361728DB
|
Infrastructure Scan
ADDRESS: 0x8c8e18bebb0e3811421a000ff85e48675a226e96
DEPLOYED: 2026-05-07 03:05:47
LAST_TX: 2026-05-07 10:57:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Handshake with node 0xf02bb0b6 successful. [FETCH] Reconstructing ABI from function selectors… [SCAN] Detecting compiler version: v0.8.70. [MEM] Stack depth: 4 / 1024. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Verifying ‘require’ statements integrity. [TRACE] Stack trace saved to /logs/TRD-F8C136A3.log. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Log signature: a8db44f75cf94793a77d448ec86d2d3d45bb9fc53effdfcc91ddabe4cc950a81.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x9274d3a1337a9be88a84141a54a1d3dae0edc35d 0x83c6cd35192c53bf3261fd515a7919cb1f58d69e 0xa349682f2da9ebe5799e3dbd8e7713ab52756984 0x12ae2fbd9a2cfc797c0a0d002b1bbc5c7c930fbe 0x0e9896ea760619f844f19b4fc46a49d2fe7184de 0xf6f1a7d3cdd512e76bf076f5a604dfeea5f06a66 0x50f5ad32a4c214afe87715f913db67a77757c8b9 0x531d1a389212dca1fe5472cd75ae83ea47191baf 0xecbcb8dd65d4fcb93ed24d9e91f3dba3b1e25799 0x3e449f8be191ee1872f496a1fbe432a36519332b 0x9141cef4e70cc627a6b2108de372989eebe73efa 0x514e68ece21f7d3c8ef8752d42bd0b00fa395a62 0x6133e6c28b5d0bd7d98eab447b92608d5ba0b72a 0x5f11429038f28b44695060fc8889507c67f048a0 0x2fda548323d0ddc35ece05c851146f91c622cac2 0xabb091a568744e443b2f4609abbf0fb6623840eb 0xb155f3d2559545670cdbfed60762c8cca538edec 0x97b32a4e6ed93949f312bb38b8afe97688cb4e50 0x96be9c78eac0f785ac7d331158613ea3558955d4 0xab3069779ec0a60df1cb8cbe2580dc717836ff6c

Leave A Comment