ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-2535A6BAB700
|
Infrastructure Scan
ADDRESS: 0xc6f5892475108a4b403c998ed510e1717d1af98e
DEPLOYED: 2026-04-25 10:42:23
LAST_TX: 2026-05-01 09:51:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Mapping peer nodes for transaction trace… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Simulation buffer: 1024 KB allocated. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Gas used: 73762 units. Result: SUCCESS. [TRACE] Program Counter (PC) synchronized at 3772. [VALID] Signature verification: 0xcc66e16771c9dd5b5bde938452e7c96836fbd875c016a59d1ee64ed0b2fc9b1d. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xb0a07cb1c1d7355721a439e3d7c3bd706e0ad804 0x5196b28eda859510a5ab629db688245d667a5f65 0xb9f44e37f7f43e76486e37c4ac5646147f64f369 0xa82c48e4035c91505105138329351b3b53f75afd 0x2f2826a301d7e3f943454e937eb8dcf1ae9886b2 0x0f237957a6e41520fbb3455a8a815d0446f39884 0xb1bfeafdefe9a691716103e41e5e2ae1ce0d2b8e 0x1d1f1f918d3d818d6521f54491b96f9eb6882850 0xb0d4090e295b556ea5c85392c9730c7c08e26cdf 0x3b88faad48c9d1af63f216bd788f7d4f5ee5b13f 0x739554ecc540714528d4295df72b0227eb2da308 0x0ba7b07b0e6f915f54a969878c82dad9edde9ba8 0xfad0ce6f0046231470ad6a2f3194100143977a5a 0x28dd48f471cae3be1f3c335748effee79aa6d66c 0x8db6f8eaf5c9c295d2dc24294614902b4de73a1c 0xaf73d7d1a7f084f1c667b3a1947fbfefc57fb2de 0x4bea54b18736ebb0e0dfe8af715e6281ec763965 0xdaf9622cdc4aeb9fdeca29a28ba4ebdfc6fafb9c 0x180b334b956414cce9be0e93417c11585ce0d03f 0xf776b2a5980a01c0403ddfac4842f3d9b1963904
