ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-A0BA8A552FAF
|
Infrastructure Scan
ADDRESS: 0xce534fb67028ba17acea2cc05637730b0584dbf6
DEPLOYED: 2026-05-15 21:50:47
LAST_TX: 2026-05-15 22:21:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Detecting compiler version: v0.8.21. [MEM] Initializing storage slot tracker… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Verifying ‘require’ statements integrity. [TRACE] Bytecode segment 0x60 analysed. [VALID] No critical memory leaks during simulation. [DONE] Triada-Engine standby mode. Load: 2%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xf28bc7b6a32c0fbfdfe6769b74e75bbd051965f3 0xad8bf13a33c3311b6077e03e1866b3bed4ee691a 0x28aff9cb8e063ac7f1058b10257276156c29ae40 0x8dfde24086a089d5457d2536517caf687d7f031b 0xdd1adcaff6c681e5f616dd1a85387a4c241441cc 0x47d575d7a66d4244206ba1699cd62bd12ec748ce 0x761e4e88cc184f1d28c74d92294376e9e08f24f4 0xa28f2cebe9d071df70967d886e978fee855394f2 0x8e8aab95e1916eb4c9af82f48c4b9504243048eb 0x341fa64fc9b71b14e96ae45ed9afa32012164caf 0xce4b27a46e71c0ac15e89059573735377a7f5e9c 0x646568ca4ad282d2fb93c34e19f273e8465909a3 0x9619dbfc8753a226e0cff8d2414ec16f36ae8fa6 0x60481c1807fd3bf91d1557c65b78db0e3eb92aea 0xbebf4facef8e82f5a516e35459c377b955feb250 0xf62c0fc6e4fdb2ed09b72cbad1943598acd969ce 0x0a2f161922d0d156e0caa6a25eff59a6276c3e3d 0xe06db5ad916f7afacecf408b57afcebf57e38927 0x7b4921364d81fe36347d66669bc095df237f77c0 0x943a1c63f637e67761910466a3661001a48405b7
