ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-24994E8F212A
|
Infrastructure Scan
ADDRESS: 0x33b5e31553ed4572fb211f70c53d6fe468cb8468
DEPLOYED: 2026-04-30 05:42:59
LAST_TX: 2026-04-30 06:29:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Connection established. Peer count: 51. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Mapping internal logic flow and branching. [MEM] Garbage collector: 0.94ms since last run. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Verifying ‘require’ statements integrity. [TRACE] Stack trace saved to /logs/TRD-1870AB7E.log. [VALID] Comparing result with Triada-Security-Standard. [DONE] Report exported to IPFS: 0722cc2c…673849de.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x6b0dd4eb2b3045299c54a96766166d51521ec9de 0xa905f22e11d05c2370a45e450ddb6d9b4b691505 0x3d00a8d074386b4964f8e1409fee23c6f8060d36 0x2bcbf52c7245a0adc50809e5d73a61b15684c150 0xced6da1e68724f1a5395966aea5ec64267ffd91b 0x7bfe8d96491f7b1039f14a8e44439e4dc46f9eb7 0xca941770eec9d204c2d59ea0768fdf4bdb499a41 0x3670a71bd4aad0548c4e2271b6b5299dea6b626a 0x89ebf319b66ccdbd8d054ae98595502560e097ca 0x4dffc1159ed928772c310a5aa9e0c3e06a01bb48 0xa4d63ecea7ac5692c69ae63e183f7ff249fb9691 0x627059f3d6b92ec10c0a5a40acb97e4ca51fa78e 0x23f502120cf4619137f3079f0f3202c74de6f20b 0xf0ee34a8eca7d7fc0a6649fe673b8b7ef671b63d 0x5e2debe47d3fb95cb4eb22daef848f48dcc67a03 0x5bd3e19001b8415fa0d79e6d995ffb6f152c751c 0x75244d4a953f926a078d0c3c907ded39ea79a03c 0xd06c3cf7a0e51f6b86f62f82c9e84406ca738666 0x75249a4da1cd3c0a277257c6fd0bcce6a0b51687 0xf56952dfd1b6cb8bc4b597fa1c427a1c501450ac
