ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-5BE67BEEE5A0
|
Infrastructure Scan
ADDRESS: 0xb8cc26ba67e1697e9ad8ed9ea333091924fdf529
DEPLOYED: 2026-04-28 14:51:59
LAST_TX: 2026-04-30 02:49:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Core initialized. Checking license for cluster-node-9. [NET] Connection established. Peer count: 98. [FETCH] Bytecode size: 7215 bytes. [SCAN] Mapping internal logic flow and branching. [MEM] Tracking pointer 0x2247a66b in memory heap. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Mocking MSG.SENDER as 0x897ad0c402e523bc2a01c114f32de263177d4c9f. [TRACE] Program Counter (PC) synchronized at 5436. [VALID] Security status: DEEP_CORE scan finished. [DONE] Triada-Engine standby mode. Load: 5%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xee1274fe43e968c2b63abb5595ecba31838a6d9d 0x37960d3d94053cbfc443b8b5f4a3df9e0b7219b9 0x1a4bf138e464d70866b8d070d30937785475df56 0xba3a39062d12e245607c4579cfa2cb5e4c3b3da9 0x665d5815f40deef1bb8a01c171e6a879e740da45 0x8518fc77008041b08e35fb62d627e349728a3dd8 0x24580100f405fda637295f63e910ea0027631241 0xb5f8efe78ea00d96def73a724839c367a00ac1a4 0x9895da5919c780df128ee87e3895c73612189e34 0x5c932ab4976253b5a0ba0b3bec8d5026ad57577d 0xdef94e5bfeac6427d8029b1252eeed65bd3056b6 0xaf7521f5db54508c3f27d1ae48a16991feac8e52 0x32f91a2288725be9f4546fd4297ef5f1ee5687ce 0xd031618694a9d8431ceb326a6c4b865489d63def 0xc225535c154cc0a0e511c3e68ab1b57b62f793bf 0xdf08abb485598940335643fc92af20e4d8fc1223 0xff928c3e0255e89252ea98da12b89cd4028c64dd 0xff0be7afe1122da921adb74351f36704b8c43901 0xe404c27a9df83d359136718ad279c0310ad1d16a 0x0c2582167fb2c636eba3b63fff1c4b186e643956