ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-92BC58DE46A6
|
Infrastructure Scan
ADDRESS: 0x2eeca49f09ad67a447db3509b33e67959ce6e3f0
DEPLOYED: 2026-05-02 03:13:59
LAST_TX: 2026-05-02 04:57:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Connection established. Peer count: 84. [FETCH] Received 44 segments of contract data. [SCAN] Mapping internal logic flow and branching. [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Mocking MSG.SENDER as 0x7e8742aeda83eda42858edc428025f06834fa0a5. [TRACE] Execution path: 41% coverage. [VALID] Generating cryptographic proof of scan… [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x5f2c740400eb9303291b7f011abe8fc51a58dd87 0x0d9389fffcf131e20726858b0dc1ca8f8c41ea66 0xaa767040a6944114cc270322049abcc630bbc608 0xd63cbd83233c5e499c47f527e576b9a56b7aa5b9 0x71d4bd992eaf62259d742ee31f7f596dd18f9a7e 0xae11874c1dd2ad1e41a093f0679df822073283c4 0xc2c5d8a055f857a57f800150d65bb872d1358a96 0xf4b9bca0ed91d11f01592f9436503b6c73738dc8 0x46c2aaccff8c575809cc1f8c627ae62d9ced192e 0xc32ca3abd4126fc6c1d4e0ef3dee6b982dcdb3b3 0x1a7453503e401e2b29fec8308b1d99ac1c90d874 0xb7cfb41d192f2c4daa3dd74f9b1a0a9821cb5cae 0x5822ba5f3f71c590c8e6cb131fb779ce5b8a3653 0x0783626d500c4c029f67d5be1a8cb850f831cc2a 0xc8a3c9fec70951f7fdd5cb0abe4040f077a88998 0xfe122a3798e189668ea6b64bdee61663e3784088 0x8c8bc99386a287b4401426397c084aa72d2717cb 0xe4d4e9ebbc18007de6a2b948c8270dddea30f614 0xd0a43e2a7b4db206e18a8ba60de0436c0df465a5 0x9185f9c0bdacd13c07c5e22c7df3d9d4bde87784