ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-408159E32298
|
Infrastructure Scan
ADDRESS: 0x3916cd0f0aeeea91d025e16c7d77ced53eb0cc6e
DEPLOYED: 2026-05-14 11:53:35
LAST_TX: 2026-05-14 12:28:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Requesting storage slots for offset 0x00… [FETCH] Metadata hash (IPFS): 4ced5c09…d3bde23d… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Tracking pointer 0x5cd83774 in memory heap. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Reverting transaction at PC: 4352… [TRACE] Bytecode segment 0x42 analysed. [VALID] Finalizing audit report for 0x3916cd0f0aeeea91d025e16c7d77ced53eb0cc6e. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xb3668d59a8b5c55260dfff33ea9d00e15a2fb1c3 0x14715149c9ac772f2b08c6e0287b6ee6b32cdbf0 0xef15d3f48234689e5afcf3988114d5bd45231593 0x05e8813a69949f6c3d8e8eed20a7306e3a01014f 0x66dcdc9a7e2eadc0259a93d81661db26650ee1e9 0xff426e468c33036700f52a3cd74b11ea40431086 0x061d0cede01d64ca28bf5b6a9471f1a9e5bb962e 0x0ab65c9b9e8e2616d86f3b98d127429b61a43623 0x3363d0e4e6f7951d9a8b8b3025f776a08d66ff37 0xcc737383eb91dad5e30bf316007a77cf38af6598 0xe61cdc76f84534bb43db362720511ffce9dfc305 0xc5083a723a39535e7c65c2ff396daf2e3c575140 0x845700df56a1b4b28e34f4b37ef1fe6afc108475 0x502a30824f35e5516530684f2f5956bd47f815be 0xe83b6f310495a399c5a7f89e15d64af66e0a59b7 0x0f9f5e9b76aa03e9ab1dbd76223fc70a322b55ad 0xb89db281fe87b0ab7b80ed969ef1bebb9367701f 0x33e0671cd863228e38b843545d851b79a1afbfa1 0x51ee74dc468d78b75ae689c2d13a7f1945de7734 0x1507ee4821d17e70ff9301b460bed68a053050d2
![]()
