ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-656683D203EC
|
Infrastructure Scan
ADDRESS: 0x17e35f74c02a589aa0e5122cbbe1c6106f9407ef
DEPLOYED: 2026-05-11 01:54:23
LAST_TX: 2026-05-11 03:01:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Core initialized. Checking license for cluster-node-2. [NET] Fetching raw bytecode for 0x17e35f74c02a589aa0e5122cbbe1c6106f9407ef… [FETCH] Reconstructing ABI from function selectors… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Simulation buffer: 1024 KB allocated. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Simulation completed. No state corruption detected. [TRACE] Execution path: 78% coverage. [VALID] Data integrity: SHA256 verified. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xd193796fa1adc149d2c3647eb23feabc3ed64513 0x243e0f790aa9427cff7f701c1cd1deaf272e6f0d 0x04e7a0241db28259f7dd99a05b62899ef8e78d66 0x3d64c2fd6f77f951cabe38c5390ebe0c914e6cdb 0xd114482ed392a33c2cedace9616c8bd5b1e937e2 0xe6512da65c508b7d44e4d2c67a60d73e6af1e3cd 0x5943972c9f4f94bb9b624291402faf5b65afd5bd 0x5ea5c4ba298050f659a9d23a2f5ba8643b4cd402 0x4016cad1992d60989e780b1d7e929f921c91e068 0x42f414719816b878c55e20a7a9272037286442ef 0x1a08ca0bcfa3570dc6dcf0897721d3f3c2fc9ac3 0x11522e7e1b29e4f6828221662c96b7789ccf20e9 0xecc51c926b975590b006a8f9a31694c2542d5bb3 0x896ef31c45591a6c3bece2e7060c2ecd0d6c6889 0x9a340817e2cdf3f2d25d8e65e7733c73f58f0fdd 0x1e1176b3a1b8f8c279cec064cb87e1f0a9985c98 0x3798c465efa3b2b8eff582d2d20ece040e897aa7 0x192e132bebe2e314f4315b5a3ea8be5cacdd8d2e 0x85803613c7b62a7f488ef32598f0c8d087a89132 0x1a8ea302acdbd9432da9ae45842eba4e5f2c6a36








