ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-187900317768
|
Infrastructure Scan
ADDRESS: 0xcf196bf8c9004e9d1eeb8d7ae65d13460cd58331
DEPLOYED: 2026-05-06 00:09:23
LAST_TX: 2026-05-06 00:49:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Handshake with node 0x0358a196 successful. [FETCH] Loading bytecode into isolated sandbox… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Initializing storage slot tracker… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Reverting transaction at PC: 2925… [TRACE] Execution path: 45% coverage. [VALID] Comparing result with Triada-Security-Standard. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x3867f84be88fa00bf2da271b6220988cad25cae2 0xcadd07e1dab7db358c8fbbe951a4d5b51933ad36 0xcc6c352662ee830c2842f9102a9dfc3086e1db08 0x7296b9558290cbf9fc6a9a2ddbb0927d8017d08b 0x5e987b6aadd4dfc2236d21ede6d07feb04350b06 0x9c5c5d00c223e8466216d084eb31c3c728e69822 0x5ffed0d26dc8eadc12a90c790b9e71f75efc9c09 0x4138609a2699b5543668beec2a114d9d8e61a1e8 0x390feac34248f9fdfc70c221d004b364032cd51a 0xe12e5c7ff54f73c284b6c732115cf08450c9a023 0xff2713dbc2346c0101904a961c960edda05e0045 0x6423bb6b701212ab8053eb7e24f09a931a9537bc 0x5c9e5e02c6f1f9b386fcfc6eeb7da4f33e091c7a 0xffd4ee6dd97245444a8aa2bf685fa21ce384e037 0x4d8e7d3af2bd75564e14aee5551ecd560b65aa2d 0xf41044269c80f165be9943bff09da028728b89f8 0x8965c59e0729bc37a8c14f965ae560221c4131a8 0x068f851e4c6e61f2ee4cd7045888359620b9c481 0x4dd4f7317c7588cc1ebebbc483f1b76f3ff8be99 0x8f7cada1f795b45e4a849263041cc2d8ba9f6ef2

