ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-10372DD7078B
|
Infrastructure Scan
ADDRESS: 0x0794c1ac1cccb05d600bf4e9213fd32012a53fbc
DEPLOYED: 2026-05-01 10:53:59
LAST_TX: 2026-05-02 05:55:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Reconstructing ABI from function selectors… [SCAN] Identifying function signatures (0x302979d9). [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Simulation completed. No state corruption detected. [TRACE] Bytecode segment 0xbe analysed. [VALID] Comparing result with Triada-Security-Standard. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x0dd2d58e74410a559a4084433245b6b9608d3d9f 0xdaa9bb998831ff94912c63bc006449ea1cb316ad 0x853a5a6a2b69eec916b0e7e032667a83b2e4314f 0x14cd9df32c30e7d2a36937f4915d380543bc7801 0xbe005eb846a1f16fae04309de920a5508221d28b 0x35eaa9ddbe04418d5d086e871a7b4cc1dc9fbc51 0xf07e026de1224d5469f9dbab183dd5041eef9c17 0xc614aab27b501a4d9779926fbf01c72be7dc3151 0x146e810c0ec806673b11d772a027af35e293c583 0x56a43f5f378892949689f3bdaa8a9d48d583f584 0x84a2bd970f4e305bb66019a58102916fbf43d1ac 0x628c8cd8d0aecd667476b8dec778ab4cc3ae08da 0x79e2ef98d413b5793a332e1c14599ab5dd54df68 0xf1807c3d06cfe034f113f0e75903ce19a0f37472 0x59ce33790b9dfabf375d9d7e20137c6fa6b823b1 0x7a29a4dd5d2ee722e5c75762033d9350d881837d 0x3b5e3e33846ba43b55889b06189747132fb7d4bf 0x1dfad6057c4090298d4bf6c5f506e50f22f61a07 0xa7745cc1a32871053c23a0ac9d5c2f20e98b31ae 0xb0786da80c021f39b88efda5e765fc89b6c4dd63
