ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-DE4F56450CC3
|
Infrastructure Scan
ADDRESS: 0xb11e19b94faa20208771f29dcba25fec953426b3
DEPLOYED: 2026-05-01 00:03:35
LAST_TX: 2026-05-01 00:50:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: E0EDEAF6. [NET] Handshake with node 0x13f16d2d successful. [FETCH] Successfully retrieved runtime code from blockchain. [SCAN] Mapping internal logic flow and branching. [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Mocking MSG.SENDER as 0xd56bd86e2d7838ea892e35a1afb887131afb3154. [TRACE] Execution path: 33% coverage. [VALID] Finalizing audit report for 0xb11e19b94faa20208771f29dcba25fec953426b3. [DONE] Report exported to IPFS: bbf09452…d12b79cc.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xc14045969b3ac7ad46298f6c191826b2dc7f6e28 0x2962a5fdf11665dd0886a1d67d905a33dd8c25fd 0xd86e3823a26d520990b5f7779b1f1e537766d92f 0x5dca349517093c6b4138b8ab43f668c212ea9dcf 0x2664db39f69278004588e49a2a85a45290a24c3e 0xdd0490105624ee1535433227569a57382546870b 0x38c7b5f3fd77f27200e8397051246fad3ca201a7 0x12be2db1952086edae8c8b7651da47a2fe32b374 0x21bc027bfa158cccf263e4389de2ea3cf8512db9 0xae11874c1dd2ad1e41a093f0679df822073283c4 0x7327a37bb8ecb7dcbd48d4e06b2366de8c01cb51 0xbfbc215be39f2e0f8b415574a3ed68a5f7af7ade 0x7d89cde2e38f514ae72ec89f7f336c696d35a512 0x59aedd16973a1680eec2602eb054e033f309aa8a 0x378709f05b3a614c2c8e0bcd0c4d68c306a4af08 0x6d961c9dcf1ad73566822ba4b087892e3839b849 0x639c89a677647bb46c1fecd708050ea72037cf52 0x446737daee4998af662668d97d990314987a7955 0x2ce4179758f72b066c75626ba115bb70538ea50f 0x9d7be9bc39a21bec799aab7a6986978454ef57ca