ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-12D5AFF58AF7
|
Infrastructure Scan
ADDRESS: 0x79850299671af4651d777c2b19606df018124c10
DEPLOYED: 2026-05-12 09:43:11
LAST_TX: 2026-05-12 12:26:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Hex dump completed. Entropy: 6.84 bit/byte. [SCAN] Identifying function signatures (0x9caef0e5). [MEM] Garbage collector: 0.90ms since last run. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Verifying ‘require’ statements integrity. [TRACE] Execution path: 28% coverage. [VALID] Security status: DEEP_CORE scan finished. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xf1d66f86e754803b9e107e75a67892468fbd4940 0x67b2fa00907af735da8bb7a25eb8943d3466068a 0x2d35740ca60ea0aa818bd9ba41ce15890f5d3755 0x6e39c0297f63b4e864f2b0680c3c87d73928f2c8 0x1c13227614fbedb061a04831e9fc9ad042555c0f 0xc1e7ab00c90d01b82cb7297e162b6760c13bc72d 0x31bcf08954abf91a56306e03a2c2d33f5b4e6012 0x01f80bb8e78e79881e8ec7832fb6c2c59f64e353 0xc7e436b9aec8a416f79af97e8c3d2ceb4929b3d2 0x7462b70bb5603a14adb7209aec2ed594358a4912 0x69ea2bc0f9b446debe0b4ceabecdb2a6c3b6244b 0x09703ef11f6db2794bf72e4017fdf5b4c42a53b0 0x8194c70e64d33357e26da0304fb1a7ab6389d7a0 0xba588f43416f470c7e4c4412a618a6611fafe5b0 0x98e94c5f9477953e6b5d39989af63cc6959d1b36 0x79746fc3275e2ad36597ae0a721de01da6878a58 0xa9c0772c9ce5ba922888834ffab9886c0d5074b6 0x24e2430396a6137b6ca09ce15eccc9a99bf803a4 0xf223f597189c5b040d39c9408a845c82a2247e3c 0x925c655c3c8e769b26166473bfb02e6607c353cf