ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-5109105AB5CD
|
Infrastructure Scan
ADDRESS: 0xb236f550f40dae5a2bd41f58e64d7ce1e04f9cc7
DEPLOYED: 2026-05-01 18:50:47
LAST_TX: 2026-05-01 19:30:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
â—ˆ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Reconstructing ABI from function selectors… [SCAN] Running static analysis on JUMP instructions… [MEM] Allocating stack frame for EVM simulation… [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Testing edge case: Zero-address transfer… [TRACE] Execution path: 64% coverage. [VALID] Comparing result with Triada-Security-Standard. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x6664d473c607049829b06caeb673fc54ea4a100e 0x07a7600761471c10ae9456368b680dad694b20b3 0xa5b2324c9d9eba3bf7a392bef64f56cc3061d1a8 0x890bbebaa9ed82136edfa2964bd82869faeb2c3e 0x97c763a8b507b6555518c978d10b1ff2de10cd10 0x959f57899a2f3e1cbb9097d5d1e0fcb5ec41b9fe 0xe64ec8690a2d06f821eb915ea67242d92d8351d8 0x2370fd37c55cbd0006cb0c52c213411a547c4c6c 0x8d9f5cb0ea938188b24c3b156eeab4f23dde1258 0x03b916abe8b8c5e7e12c33a1b8021dccb2cb75ed 0x1cd6d456afef9cfff4296049739ff7bd084869a7 0x9eb4b57a03f35935fc86c5500ab23c05886587dd 0x3aa78f26c843dba6a4835b298a9ac2d6a17b3527 0x89b8b52f0873c4980ade6100595329577b8bf253 0x4b4bed7dd20bc6e1942fbe883e73fbfe37ee0910 0x392da1edd228a82e941aba567e56a962d7c3d542 0xaaae21a4322fbf92202792d970ca4cbdaf794b0f 0xa759c256c843ffacc6f216747b34ac58bce5cfe9 0x58c053f6aff3b6b2d5d1a44b8a2adb2c6337ea86 0x2ed526b627240971ebf316d60268c0dec824e354