ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-16AFF10C7FE3
|
Infrastructure Scan
ADDRESS: 0x2ed526b627240971ebf316d60268c0dec824e354
DEPLOYED: 2026-04-28 17:36:11
LAST_TX: 2026-05-03 08:33:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Latency: 86ms. Protocol: JSON-RPC 2.0. [FETCH] Hex dump completed. Entropy: 4.28 bit/byte. [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Snapshotting EVM state before execution… [VULN] Checking ’Integer Overflow’ in arithmetic ops. [SIM] Reverting transaction at PC: 4577… [TRACE] Logic branch ’if (msg.value > 0)’ verified. [VALID] Finalizing audit report for 0x2ed526b627240971ebf316d60268c0dec824e354. [DONE] Report exported to IPFS: 804bccbd…f305a2e0.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x16a8b545432d71bf3d1f473e9c67414b5a8e19f2 0xbd5ac898b2f59a7dfa63040d0483a2d092666970 0x4b7ef7765da150bb06cd9b3e536b8e749e286a9e 0x74fbdf73c3219d87faec7d471d0fa3938c4045d4 0xafc8a69c2d450ba5c6f9859647154d5bfb1e7da3 0xa3b6b51d14d65de073900006bb2ad4f79d771746 0x34ed38230ba1d5e794e0a47a0711e89f1faca40d 0x94ef6a3983b935c1e28c65b2baa1a03c44a6d861 0xfd87c3c9e49aea92155b22933a729eda1c70ad27 0x976468e15f3e4615aacb742daff239f7d85321c9 0x5bf739618ea50a65d432232e405d4a4381794017 0x76bb2c593a4b1081da59899a579adf815f52bbac 0x9387b8e835e2455834da3fa15db42a9b63ff5783 0xefd8a1bef17767f7af2eafa75a4d035814b5a0ea 0x01f7e2d64f7df3a881a11ef645a4aa3fc3fb5dcc 0xc25f15b98952e900565672b4ef9c5eae4d79fdb4 0x4b8d7f97f624845383b77624c2b7b308ac16e23f 0x420180056bcb4cd92e8b51ffcda5fe03a881b8b6 0xc9a1fd3cae394eca5caf9411c6c5c43df695cbcc 0x1df920d15242544aa61bdbb55dc6610f97deb4bc
REMOTE TAKEOVER RISK: Security Review 0x2ed526b627240971ebf316d60268c0dec824e354: Remote Debugging Potential Risk
