ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-F776D6F4678F
|
Infrastructure Scan
ADDRESS: 0x6b184a26111ab81d90384ed53c652c81db931b18
DEPLOYED: 2026-05-09 02:22:11
LAST_TX: 2026-05-09 03:09:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Fetching raw bytecode for 0x6b184a26111ab81d90384ed53c652c81db931b18… [FETCH] Hex dump completed. Entropy: 7.54 bit/byte. [SCAN] Identifying function signatures (0xfbec8b1b). [MEM] Virtual memory mapped: 0x0000 -> 0xb0c1. [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] Mocking MSG.SENDER as 0xa5043d79bb82eea97059b925040dce128fd69533. [TRACE] Execution path: 32% coverage. [VALID] No critical memory leaks during simulation. [DONE] Scan task 1D8B4F11 finished in 17s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x1cc65a5ad0a9854b277f6d2d451cdfb6e8545a6e 0xcb00054385030478b32b4d547e432b486e680a0c 0x070f09a91b88bee5d6da74c2dd454e3afe2894b1 0x19caccf270421171b4f5ec1357bdaf7bbec5f274 0x4808d55b31c8e487fdbc5093452999de54d203af 0xa19e1a6f65c7b9b12434363f321af944f28c7dae 0xe40c736199311d8684c06a21600392a2698f2e57 0xf90a98430dc4e907590d22e566fba74023591784 0x918aeab8b715ffca6d0db257e890d39716f76fcf 0x45ba584c61a442db6560cda2dc331df75fcb8170 0xa228726d5368d1350b315e39cf9a23962655560a 0x64a8518985b1b91812b85324bb0177f272998192 0xe32f80330271d55484226cfd34f111db8aac3b42 0x18af22ac4df523d082129f9f13bcc7f1610f8b11 0xb179d1d21e4614ecf8bb23298c3b36eeb3cb3572 0x4242e3809bf50726682c7e4d2526ab9581fac8fd 0x1714e782eb2e646a484f3d2bf7ab400c7d0a0166 0x2481c214a0cbfaaedc8e9585cd6d3ea685020e64 0xb37a53f02766aab47106bf1ceb31b4fd63a4165d 0xdc7d2f78a04d7738bfaad7960a5e8eebc73aabe6
