ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-0ACAB18F9412
|
Infrastructure Scan
ADDRESS: 0x256eff6bca04c96b3224073637edde2d8dc9746b
DEPLOYED: 2026-04-20 01:47:59
LAST_TX: 2026-04-26 05:47:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Fetching raw bytecode for 0x256eff6bca04c96b3224073637edde2d8dc9746b… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Analyzing visibility: 2 public, 2 private methods. [MEM] Simulation buffer: 1024 KB allocated. [VULN] Probing admin methods for ‚Access Control‘ flaws. [SIM] Fuzzing input data for 30 iterations. [TRACE] Logic branch ‚if (msg.value > 0)‘ verified. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x7bcb750d388822ba6bc0fab673d7ebde2e5fb996 0x4378b3474f74b02dadb34566775568c9c0b343e6 0x7e050631454a46be27a835e24a95dbddeb8ed03a 0x4b96e466667fc5085efc55296c96e352ba44cde8 0x7bd834039eabe9491d8468cd9b9577aede45b44b 0x6ffd730717010492042a5cb2574e535f792b625f 0x360ad3c0ec4cc1325f2670a9bd90b02558b29db3 0xc34b085a6686100077c90d2a2cea6b3ad2a7254c 0x4022786a2dc5bb22902bb44e1775614fd2016f88 0xe11ee2b0178cd4cd818d8895de84889d18e6dad1 0x85c9237eee51df1a9461b8331c82c87453f853eb 0x34455e1d4087756e979dbbb9f9c86e5827b42e6a 0x38dbe9cdbe235600c9c2d59017f7dc054ab32e5c 0x9465f71b83f2074fe48434968211388856deb723 0x3c5f3a8297a068d12f07269963a9073048dfff25 0x3a0a344d25f8575277760e5c70897c9a967ce2fa 0xdb6e69321fea5e2230ba69cac1884a59350468e2 0xa6c6a69bcef5fb70cd5a2e594a81871c2dfdbabc 0x13ada44709452cc2b771f392309cb184768eb289 0xb9d20b5bc3616d84a922397e31bdea61d15b0bba