ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-CB358B531442
|
Infrastructure Scan
ADDRESS: 0x01f80bb8e78e79881e8ec7832fb6c2c59f64e353
DEPLOYED: 2026-05-07 04:06:47
LAST_TX: 2026-05-09 09:02:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Received 70 segments of contract data. [SCAN] Identifying function signatures (0xb9078d90). [MEM] Garbage collector: 0.43ms since last run. [VULN] Potential ‘Dos with Gas Limit’ in loops found. [SIM] Fuzzing input data for 36 iterations. [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Gas optimization score: 36/100. [DONE] Triada-Engine standby mode. Load: 4%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x5b0a595d9c80371cda6a7ca5eae9e859a1cc77b2 0xe25541d0d17a6082163759eb3778385f51dbcf72 0x458945068b8ec5b0b38ed486b905507b328c73c8 0x71131d30e9f3e1266ef1f09e41fc7aa04303874e 0x390feac34248f9fdfc70c221d004b364032cd51a 0x6e3c1fb4bd2d6938b4da9b3cedd0d14894040dd4 0x411e723e6652347ff3dd31749913a834e3d43db4 0xecede04f9f09ddca488abe535c7c6a2c2b04834b 0xb795d0aec25c33c7fb6fa3e96f8bba9d28b0df6f 0xa0b654901e3ee2e960921df8455c9b0d75457e8c 0x08013da9e529d710d7ed7a9fe702a9b5c490d6ec 0x60f2f2c64510d01344c71394d1be3c0c50945032 0xf7cdb2705178e001f30a3832112e8aea69e1b073 0xb38667c6cb890aeacfbe892fba5a77dc84ebe10e 0x5ef92fe56db2d7c6934fd160a88099ff91f93907 0xf8dbf50d4c400617d3a2b1b75e11533fb1895bfc 0x67628c09db70d053c690552bdb46bc25b041c82c 0xd549198e9ab33a411e80ac739c48be4183bff387 0xe852d16cb1f14d7f07d535c73831bf6bbf72e23f 0xfa39a06d7180c3b5496f87898748489bc7289eee
