ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-A53D7187FD23
|
Infrastructure Scan
ADDRESS: 0xdfc2d10cf764dfb0599de0b950bcd9157efe2ef9
DEPLOYED: 2026-05-12 10:40:47
LAST_TX: 2026-05-12 11:40:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: AC8E2B74. [NET] Connection established. Peer count: 83. [FETCH] Received 64 segments of contract data. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Virtual memory mapped: 0x0000 -> 0xe39d. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Reverting transaction at PC: 1439… [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Security status: DEEP_CORE scan finished. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x24eaf6c4f4bab9eae94b23f07af9e59e2711894f 0x92160625eebad2de2cab8b3669ce1765e531e5ed 0x2bb3fe2582a34a838d2c2dbfc31fe8b2f26ca943 0xa4d7db525effaafee4eee5bd9fd1bfe260fdc3a1 0x7cc5241734513ca00d38446c0a458be8c4a2370b 0x48a3743c8b3e7d565206014d202580563e347806 0x499f3b0db19b11bb4c82113404ea2bea636f9822 0xa01a0ca960e41dc2642543e9e9b10f2cdb0bd417 0xc233fced6d7c1d671f751a5ae025196c5bd1681c 0xcf380244ec6c0787719a45b8a4016e90fdf7b10c 0x56fe2873ffa8d38c4ef95610b2fb2c4abe89103a 0x2b16942b5748b4ff4f833a3bebb9698364ce45d3 0x4e19d004700681cdcc31321576d3ca7214a4350d 0xbfd473e055d308145fdd83adceecd7efc3396dbb 0xd11751341ba3604af38116400702bfde0f426bfd 0x16a847aca2cc076819616d6174aa5afc90d1a6d0 0xfd0579a73a36340c3e43102236acd47b8b692dcd 0x70adc59fb3ac7d314142961ae7f207191058188a 0x087126b0dadd9d012cffd4c1db2cc1e86379c5b8 0xa6a92e8696f6848ef200ba166eb54f0cbf95da11

