ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-46507A3EDABE
|
Infrastructure Scan
ADDRESS: 0x8ebb2139ab06b249adcfa3f1f6c59f6f4a932402
DEPLOYED: 2026-05-05 01:26:47
LAST_TX: 2026-05-06 04:38:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Handshake with node 0x17e2eadb successful. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Detecting compiler version: v0.8.26. [MEM] Clearing temporary registers for deep-trace… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] State change detected in slot 0xf8. [TRACE] Program Counter (PC) synchronized at 6967. [VALID] Finalizing audit report for 0x8ebb2139ab06b249adcfa3f1f6c59f6f4a932402. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x0d50087ec04881ab173d31b90c0f7f69dd83e1c8 0xbb19c6461e70113e1a31fd3269801f19c2ddc3c3 0xcd289a6f88b6b2942a731992426efac665174541 0x2bfa617e98ff7be16be2090ded779b48fd31b90b 0x74eb8e04606d821a478252a656e5e743475d40ad 0xe4321cf4f0177ec4c1ef76a2cc2de7afb7bfb457 0x3fc21561092ecda29386628e11413d67c8113dcb 0x82614d6d9bb7b76a93e6b59ba9ae0c17128da5a1 0xa217f57e7ff446ded7fa69a1cabe9c0457ac4608 0x917d6788f45faec233f610f95b1c6204a237cbc0 0xf8f0562632bb1858df0b34d61582291a55dadb6d 0xd7adc364b14304383a5f18c52a7f80e42bd8c91f 0xb82601823baa0f5b492406bf2dfc3ff7fea24f1a 0x1eb30e144a14ab453ab70e59fcd4cb5f46ec4faa 0x937e97dad0ebabe47fb4929e7b0aa484b7e1f7c2 0x78616307ca35d8ea77dba5dbed335d1250bddc0d 0x42d5a6d4d019ed025ec6af95356217303ec71cdd 0x61381121ae003351838de7720d488a624cd28e7e 0x1f93e58854cb8c338031188034c4f0d5cdd73f63 0x47c1d82b36385f4cedfb618bd4c72da5655064ce
