ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-CDA5204117F6
|
Infrastructure Scan
ADDRESS: 0x5923873c729c875ab1f3cf404b6c23723076e4db
DEPLOYED: 2026-04-24 09:58:59
LAST_TX: 2026-04-30 16:53:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connection established. Peer count: 90. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Analyzing visibility: 7 public, 3 private methods. [MEM] Stack depth: 2 / 1024. [VULN] Warning: IS_DEBUG_MODE found in storage slot 12. [SIM] Balance check: 8.32 ETH. [TRACE] Bytecode segment 0xf5 analysed. [VALID] Comparing result with Triada-Security-Standard. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xba74feb9415188c34ac886a11192c8902c3951a0 0x5b6478c559cf1f16013bb107cb8e9768098407ff 0xa763bd36e9b74497864f79b17bef5e3947afa808 0x537a3845c724abc5457f7c6a87510084d52921b6 0x17e098b541d9da42860d1e34cdc360fbb81ac521 0xff3e8e33b073104f4343402c55eb4fd3f18885de 0xcbea1cef95e4bddf5aa80181f8f2971f57296bfc 0x87543e2ee90ff3b6899814960f3bbcb6d7078b2d 0x9d7be9bc39a21bec799aab7a6986978454ef57ca 0x745b17f516053090b33c8c66148fd218d0a7c73e 0x7e93686c605d61f39a2cebdab8094e43ed42f716 0x9888f75eb4010eb3e7edd4275adc981acb46f414 0x86beb8954b4ade3eea86689b3753f55d4b3b60c7 0xd06c3cf7a0e51f6b86f62f82c9e84406ca738666 0x72280ba2e31d10d187f7a5bc22ab1e7d120999ab 0x1af84a8849a6db09c02cc56405b6e640450c935e 0x82a6cf183a21d074f57a5ec65624edf4605f268c 0x20ee36e6c8a94a59f0ec229edb965695dcb5df1e 0x7bc066d57503ca98c944b95fae155f6d9c95341b 0xad7209d932323e6d2a2f869a1be99e75e0482244