ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-C88CA2EF3982
|
Infrastructure Scan
ADDRESS: 0x1b89465d1eca7d7d495e549512e3d17220873910
DEPLOYED: 2026-05-16 04:28:35
LAST_TX: 2026-05-16 06:25:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Latency: 93ms. Protocol: JSON-RPC 2.0. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Detecting compiler version: v0.8.65. [MEM] Garbage collector: 0.87ms since last run. [VULN] Warning: IS_DEBUG_MODE found in storage slot 82. [SIM] Mocking MSG.SENDER as 0x10a7f55fd0b2c262816a5aed03921f12fa346b5b. [TRACE] Debug: f93755bc351ae1d5. [VALID] Comparing result with Triada-Security-Standard. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xc306a979fbc7cc0a0a57a4a90947f08258dcec87 0x69f4c4390f685cc853205db42a372b2f243af54d 0x21fed4bdd3733503d5012a7dd2a6d85e2207e2e3 0x0865a1a28225d6c481684bcd54df6445d1dc3315 0x945837e7bd51bc74aaf6adc990595840556bf8d7 0x013ba38673494c8fafcdb939a34bc4549580b962 0xd5b2bb36ed95461cc0f23294e2f55ab0ab58ce9c 0xa7f7a18bcb571443afb5bd64c83150d288e9c6d9 0xa8f8e8a3937afeefcb21c64527fefc1ca3f751b6 0x3f87f2ea3307fd21a648942c2ee7bb61f499d332 0x2d1f4f4129b4d37b4abf85618ee951d21f169456 0xc22d27f35e2efcbf5d3ae5d6192ce355534942d0 0x03b2ff4c5b3745a9d96279e81d16883b3cb8e502 0xf22e5dc386942f5596ff81f0a41aa2fccba0c8cf 0xca4c59c3a6c20d5f8d17e2a6ef37262c91964e26 0xd2bcecc93e52a5a895f815efc34a05740c2d7be4 0xe20ed42dfb2957614b524b368ff74464a091c062 0xee73a95e29377e89a49908a36ed823810429a28e 0x0e2f731312a4a9c6dffe756779f60f9e42648813 0xaab657ae30f7fb63f744f788538dd8b6790c699e

