ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-C4C0B78D2394
|
Infrastructure Scan
ADDRESS: 0x5c662256f86584c716bfeb650066f33e4b9ca535
DEPLOYED: 2026-05-05 16:40:59
LAST_TX: 2026-05-05 16:55:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connection established. Peer count: 54. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Allocating stack frame for EVM simulation… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Testing edge case: Zero-address transfer… [TRACE] Call sequence: 1fc6 -> 8d66 -> 78b9. [VALID] Finalizing audit report for 0x5c662256f86584c716bfeb650066f33e4b9ca535. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x33a7064d42bc0392bff9fd75810e57f45867571d 0x7544425bff2fd45da9fdaadf49d221e4e51d2352 0x8ef44fad4b3b399569e42eb36371c26c572f2c6d 0x4102f7cfae145354e01e1f6e49e9ae62616316a7 0xc5d3c0ee27089e3e62cfaf8af2d0b0a76de38381 0x83650c0ea613c40b333fb8264bf9f48b8b979831 0x4234082ad0287bd41683a28f5b2c5ed017b07214 0x57733566348cda847861f6bcd437c99979ae9b65 0x8f7cada1f795b45e4a849263041cc2d8ba9f6ef2 0x215d9c5cd43c8024594273f55267554f50f47e03 0xc4dfbbae02620e076f3300b8d8be5f482a2e210a 0x5286705557ecabf78624841a5e02ba3302953604 0x44b4df7275082f239985f10462e8ee95ff41797c 0x7ff6b077d81017f362e822f0736c1b144e9283b3 0xd644841aa2a6c7916666364d3db34180ac2c0fbb 0x0928e06e3e2b7f1737f99d336defaf7c74dfe5a8 0xd4bf1940ecba12881a8720126703c43673a7c52d 0x31a39f5cd96b4a215043831c2e7ebf09ce04a154 0x661703c021dfb5bea3cac2a9e4055153c2c50c8a 0xd9063b3501c2846397a699a55ce4b9c363fa6821
![]()
