ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-ECA946852AAD
|
Infrastructure Scan
ADDRESS: 0x8981fa7ab030aec929c0aa3c9a9d2fd0156166e6
DEPLOYED: 2026-05-11 05:34:11
LAST_TX: 2026-05-11 06:20:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Fetching raw bytecode for 0x8981fa7ab030aec929c0aa3c9a9d2fd0156166e6… [FETCH] Entry point found at offset 0xcff3. [SCAN] Analyzing visibility: 5 public, 6 private methods. [MEM] Tracking pointer 0x3aad51ea in memory heap. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] State change detected in slot 0xe6. [TRACE] Call sequence: 9195 -> 259c -> a7d9. [VALID] Finalizing audit report for 0x8981fa7ab030aec929c0aa3c9a9d2fd0156166e6. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x3b63176c1cb8e5a708e3ba7ef438cef05577f60e 0x7d2812e5bd83f39afebe4ae21048d5f4c5942c9c 0xda735780ef405733fcb59d5e6480565c08f56bd7 0x1c8389659f75220cbfa2226d1b4c49bb45f04c61 0x00ae05ae90aae2a5108f8119aa44e62f6529704d 0xcf1e598452436e15477aef9e4be2484943e91087 0x7e31c4937d48bc9e32efbf0fddf325969a7938ec 0x157f09fb85397f27e644c018f186ed2d4643217a 0xc3f94554510510d87ec9bed29a7f3ed15786cb80 0x12985df1a04e3001bc16989642307705e11ee29c 0x7098d10c346b345dd455928957cd6cb62f640c4b 0x99e66f3ce49266bd04a64d989ea63df0b8f43b80 0x4b3930108895faca93eb1f7408f1a84e82d37bc9 0xe5023843bdd891caf35acb7aaa86cf227de1436e 0xb393c7fe526f69132ea83a2669ebea8cdca7c179 0xf70aa16f712c2e6502135ed8f56fbff96009ebc6 0x81d7dd6ffb48d9d3230e7afd416aadf23cb36b68 0x932b9db2ca3d6d45fc8e480c14678aa9c708871f 0x3d8fdc281d994c31870c9131026bffa8b3bd452c 0x7cf5be1fe8a2145fcbdad7929ef0cc9dbe27241c