ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-34D4EEC75771
|
Infrastructure Scan
ADDRESS: 0x147c5a33ec1ecd2698ec19a1bea9f0d2a26064dd
DEPLOYED: 2026-05-07 05:15:11
LAST_TX: 2026-05-07 05:54:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: EFBF1FD8. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Entry point found at offset 0x424e. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Stack depth: 6 / 1024. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Mocking MSG.SENDER as 0xd2ad44daee0062dbfb3be0c118e55d0110223fc6. [TRACE] Execution path: 78% coverage. [VALID] Signature verification: 0x26de0bc4e02f5566bdfceee9b76eb067279185a8da4d4dc05b5feeaf9983f7f8. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x36508bd761397024406d8bcaafcb397e3bf7eca1 0x9cb89ae1572bec6bf262dde7819b305d6d4132c8 0x12d5beef6f418d7dcb626bc701dd1bc94d1d6783 0xc9d1dbfa11c5f914e7da82b9f744df95d5485369 0xae410e85183d250b8d5d12c47d171f8d796bd3b7 0x6f7f9460488678b8ab9321afe464823dace32b82 0x4043223f17a5c4e20f8348befa6a8d225189ce32 0xdc750769e47f29569c8f7d154e061d4ad093b750 0x3cb038fa55b87fab72b10154e735b36a5e5efc99 0x34aeb74138e7e81a67f8d4c1c598744f9f04764b 0x3f74556f0c03179eaaccefe906f4c6669e221ae2 0x085bb539076709954564d19de665a0a48f838d4f 0x561f7c7bcca4e3de6409ddb1632dbd1d4e9d6c9a 0x87495384b4477064fdfa845d9f8370dc56189e91 0x73d03b9ba674dabe7e679ef489d4cc8489a38bdc 0x3fd2e820bc127f2dc7e1e319ea93871237e5d61b 0x5afe62f8b3a970322596db8910e43869786a16a8 0xc8119cf005cd3d7de1c407a248066b6d9a9a6b4d 0xdc965252d69fddad7c7a04dc1275b073147a8a8f 0xeff55166b0c54c60b0098390897973a584aade07
