ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-55D891999440
|
Infrastructure Scan
ADDRESS: 0xbe329eb76d7b13949b455a2330ef1a45e4c10440
DEPLOYED: 2026-05-12 20:15:47
LAST_TX: 2026-05-12 20:44:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Fetching raw bytecode for 0xbe329eb76d7b13949b455a2330ef1a45e4c10440… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Running static analysis on JUMP instructions… [MEM] Stack depth: 3 / 1024. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Gas used: 80867 units. Result: SUCCESS. [TRACE] Debug: cac122b511c6360d. [VALID] Security status: DEEP_CORE scan finished. [DONE] Scan task 5D80BFEA finished in 32s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x8402eb131e983a1d6fafe27e1b7afe201f75e6e3 0x4f07981db60fb5f025b55b8feb6742533dd9ee71 0xb0196f24a24d33b8feadc6d66813ba2e8137d5eb 0x8d96ad7ec0653e5fb838e16291da6547cac84972 0xcc4c184f159d564a59518563a4df98fa774e87e3 0xea75819130883166777c636f293ce8f76f72fad0 0x69de3ddaf94bf0457aacfd0a2f9f8b0cb60af3ce 0x66a02232329f3ed6fe54ad09b32187999e2fafba 0xf458eaaac1bf74c57a75e57ffb7039979e42a7a4 0x29655edab28d3b2ce36dfdcda6877fca15753ff2 0x90870512e8ed0db5290dc73ef07e3f969398d554 0x6e17ab063241425fdcd8e2c92ddfa1f5d7dc4a4b 0x63b3ad9946d6180d02740d11bba4b8827b63d8e3 0xb0ce9420ffab199838831199c0fd9c933f64277e 0xaee93fc53596bd5f795a569cf64f629781f635b3 0x854177eb9e4818a9f56f40e220f49da8c1df87d6 0x8ba7987db204c8091fc8c2699996c43eef35b04e 0x48d9cb968cd97df6d6e044a4d9414c2df0c8eabd 0x18cc5a548a1df63e37c0862aa913c289ad2bb20b 0x930962225a01854120b2b379f65b879a1a3a444e
