ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-22F79FF42C0F
Infrastructure Scan ADDRESS: 0x41cc011e768b2859f2aba42551762a2a17b26fed DEPLOYED: 2026-05-07 09:42:23 LAST_TX: 2026-05-08 10:16:59 | Compliance Status STATUS: OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol VISIBILITY: ADMIN_ACCESS_VULNERABILITY |
◈ OWNER_PRIVILEGE_EXPOSURE An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! | > Execution_Trace_Log [SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Snapshotting EVM state before execution… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Simulation completed. No state corruption detected. [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Generating cryptographic proof of scan… [DONE] Triada-Engine standby mode. Load: 2%. |
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x83cd50e98a48fad4e1f105ba5a3fde9dcc1c355c 0x0755701f4ba7ed9bcd695ad8064003ce53f72071 0x36726fec0d46b9cbef84a77d3b7e4e8d614a0ff4 0x6b39a2039532ee1f3b5081e87317c4afeb3db175 0xb4c49b7bcd965974fc92563b49ee7ac2bd0e6d6c 0x1ddef7fbc04d377dba7d43518eaf6cc6f50b4bf5 0x2399103f7c689bb02c8d47119ea6cba8d5d7070c 0x5773cd50d67cb607b1c61af5bfab1450af9ec530 0x7d0f6c4be0646fbaf830a9cf747daec10d992009 0xa8bbc56e225a04def8dab13de2b565ddfa4367bf 0x9784e94bddda96f99d671f4309336492cf5f4b81 0xf1cf78d8ec3d90337eedb1dfbad35cfcbab96b17 0xf4300901f0a5b398c9bd4aa74797b236ef1fca80 0xc015ca668aa2f67ed32533b06ba592e08ee62944 0x9e5f5b211ba421a5c910637076c45ac27b2d01d0 0x868210181cc67ee60514ea8fc022209669b62d8c 0x45aa14387e9694cd8175d20fd8b69ab6533c83d6 0xf39d3346b699eca64f9c88350c03456ca0eded30 0xece58af9baf03a7d19143b3119f21ef538fd508a 0x50597c55c5dd3b43fb337aab144ca95105170b4b