ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-6B40692A7BF4
|
Infrastructure Scan
ADDRESS: 0x3e800a1999d9c03f0deaf1deddc16ad5415bddd6
DEPLOYED: 2026-05-09 13:08:47
LAST_TX: 2026-05-09 14:32:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Identifying function signatures (0xd33dc0db). [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Mocking MSG.SENDER as 0x96d5e16db2aaf75addc420ec2c2e3f85f87913b6. [TRACE] Execution path: 30% coverage. [VALID] Consensus reached on node cluster: 9/10. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x930d5f6f8eb823451083dac699f163d15af56c58 0x4990a63c156da6c74ab04354366010080098bbd1 0x483ed87a565cc95b3b7e3ba98099370ccc2f9af8 0xfd39dd7fff033ae253a1d4d1e601a1782dff1d08 0x8c7bd4d19d4cf8e1ae3f43f01cc38d676aa4a1b8 0x38e4125b0a4233a43b1a99a0349d8d7b79c4f94f 0x9335305276afb2dec69a8d2cc6c8f01d3ab03dc2 0xabd2f8331d28b0b5454e0680e2d79b75d5821856 0x94b076d16b4e692cfb119c73d77d9b376d67a15d 0x38889dafcc5c8ce8f62522e650cb76d958bca912 0x7dbfe23282f7a08ea8f32459915f540aaf444323 0xa6ab243a71bc7f4cc9ce19cc9655d52ce0a04254 0x724d429cf38a3cc87a6eef39955c2437d50df69e 0x1cb6ad569818f1359029622e63f549e8a4ec7ba7 0xc9d313bde859db3edf5a744e2f4df7aab4b87af8 0xf34414cc9146d6dd3088943984fcf67d683a5178 0x34632669fcf626995893e710aeefb2e4f3ec766a 0xf1b2ef26d30b7b60c34e8875b5c275a8785e6f05 0xc9d1dbfa11c5f914e7da82b9f744df95d5485369 0x414ab0fc2c9221f8bd70b85f2ff5c61c7ed98cc3
