ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-BE0DF4D82D50
|
Infrastructure Scan
ADDRESS: 0x9abc7f90044c06e9d3c68888f7fb4916e34acc3b
DEPLOYED: 2026-04-27 18:05:59
LAST_TX: 2026-04-30 09:04:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Handshake with node 0xc0d4ecff successful. [FETCH] Received 87 segments of contract data. [SCAN] Identifying function signatures (0x0667a3bb). [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Mocking MSG.SENDER as 0xc70768285e4bf2104eefc51d306e4c3fc8ade055. [TRACE] Bytecode segment 0x4e analysed. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Triada-Engine standby mode. Load: 6%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xfb54b76928effba2e5ec6495d30d61c04a532b11 0xbf31aaeedd2a8d11d25079134739d96397dff8d3 0x0fabe7189ab9b62e525df51f086a7e3584e5976b 0x4a734bdfc4f647a3be14499c8e1a2e5461efd5e1 0x0690d279238dfea625d1bbec77cadfeade03315d 0x903f7b51bb78ac460e55fa0dd783ea3594a6f6a1 0xae1b8d2b296e1e1f5c73eff0c83d850033eb21dd 0x7e077f45ffe62c40ad623bd06955106db79df1fa 0x6ea89b4290285c32fb36b6c372abdea35b21e458 0x2abd36b6199ae401e21e9d239884be1eaebf068d 0x7f68007728bc4ffceb55bbe375eca93f70a6e991 0x1cfb0c2539024a67837b241543c6cfb4e001e7dc 0xacbf05153bad606f90aaf272269b50280aa369f9 0xb614915c457bd40ef73604949f182a3cc23fd522 0x4a0b59c4d341c69e2fd50e44a633046911227827 0x439ebc2e594027c0d0b2c1f6f56976cd017e8009 0xbd0fa5b877f7f1fa473382ff21cd661c18f2c56d 0xbbe3c0f8721941bad73e2b7462c934df437dee94 0xd7d72f85e1da7f33caf437b68ddd0793f46607b0 0x4124c0681bd12aa97c253b4f7bfe498576094c14
