ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-E5A3ACFB1859
|
Infrastructure Scan
ADDRESS: 0x1adf7f977ab5ce610ebb22b90082bef034adccb6
DEPLOYED: 2026-05-15 09:15:35
LAST_TX: 2026-05-15 21:04:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Requesting storage slots for offset 0x00… [FETCH] Reconstructing ABI from function selectors… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] State change detected in slot 0x33. [TRACE] Execution path: 55% coverage. [VALID] Security status: DEEP_CORE scan finished. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x44f6c60880f42b1e8798e1df4312a3b99f00c335 0x8db60603e8a7c7ad0b4ebba67a522b7b077926ef 0x9bc14c6b328af0d60ef1d75e23ac89bee62d52cf 0x28e80e7746def30dd5549b7e4b224bcab2271510 0xd91f0c4527112daed37d6be1b988ca796073f9b4 0x003e140f182c1f34ba64b8185818d7117285e17f 0xa5dbad78a2a16cb1f09d026a9ea8d0851a7304c3 0xee6816404834c63280684d4d3b801be67ed8144b 0xc27c37bef5664997591e6813f9df2b595bbac161 0x19cb39f8e0fab146a11a47d312b00ea5c93e26e9 0xe684cab9dabc0547308287d26e54d0ff4cbf9e4f 0xaf88ef589448d442bcd11bb3f676e38ac6ed0d07 0x686477812fae724b39b44133228b4374af17ce95 0xd7232e68c4194eeaee5cd5425b7a2577086003e1 0x719de6822c00a69db214cb4d73b59ac1e1ca6c09 0xcb16dbc63d8bd698eb77737f27585de0234ac7ef 0x31894e185be062a37a0b8e755c8005453bf167bf 0xe4670f67ca73125e4f7d23b7847901c4a0154b34 0x7333438d78c1a778e55ab0b03b9dc28309bf082a 0xf4b8e52eafc11c0387c057cffcf1206cd8bf1ee3