ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-587BADACA6B6
|
Infrastructure Scan
ADDRESS: 0x6605148336ef5e655841f340027b67b05fab793d
DEPLOYED: 2026-05-01 04:57:23
LAST_TX: 2026-05-01 05:23:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Fetching raw bytecode for 0x6605148336ef5e655841f340027b67b05fab793d… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Running static analysis on JUMP instructions… [MEM] Allocating stack frame for EVM simulation… [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Simulation completed. No state corruption detected. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Comparing result with Triada-Security-Standard. [DONE] Disconnecting from Ethereum node…
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xcc1e5c756c12624acbd326702e90e7d924f3d4db 0x06d7b60e2c48753c7615a97eef80835f82b59830 0x31b23167bbab99eb37a65c68246b955ede65bdd7 0xffd873c1b784a6d6aec8ab8bc72950fd54010ec8 0xa46124a139499f2c7638725c7ea9f30bf673db7b 0x04e39d917e0d515384b3c027658a8b2f401eceb0 0xc47301cfd2f74ecef3c4100543bd1c21bdfa0c48 0x0d672c1b9452fa3c281e2b1ad8f50f9ac486f48a 0x7daa6d79cd4d6ef54468c1a728abf4ae7d6ff76a 0x5775ab35b04111565e62fb2134db558f14c259a2 0x86ecdbafe0e2c6052beda7fd789c62920a0baafc 0x6538081dc414b1fdc4d3e8c30492913284fe1984 0xf6a275d07474809be9500be2784afd5ca7ffb1e9 0x999f9a51e2c02da5cb688f56999ef00c9367d4c5 0x78cbea4d3174cc5c47b422972bb848a964583bc8 0x9ea35c472121ed7782ac81bb920974dae6443585 0xf811917f1ea0f428d0d0759721733d76d8be31d5 0x052ec8461f2d06871df69cce7d88495245ecf6bc 0x6f0c7270007ea4300c600c457cde94b1194f6a55 0x4b525406b7b1d30e4f47636a0cf7c9592145e581
