ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-702B92AB8A07
|
Infrastructure Scan
ADDRESS: 0x68b9a2759724f174ed6142e90a78d6f1fb8623b3
DEPLOYED: 2026-05-01 15:27:11
LAST_TX: 2026-05-01 15:48:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Bytecode size: 1102 bytes. [SCAN] Checking ‘immutable’ variables and constants… [MEM] Initializing storage slot tracker… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Testing edge case: Zero-address transfer… [TRACE] Bytecode segment 0x1f analysed. [VALID] Comparing result with Triada-Security-Standard. [DONE] Scan task F49EDFFB finished in 91s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x759f786c63d9e458c5e90f80bf315000b67eedf6 0xee2b371f7ff3c8d96cba0cb56a37f6e379ed1ed7 0x39fd3836ad82dcaa92ff0ea338e17ad41e604fdf 0x69bbd650ec1dceade8fa988ad774c1f75300c74d 0x4dbd65cd43c2d86df038a925b34ce9d5b39d69bf 0x976eced8388793d9170310ee19f4fa175f45cb0d 0x637875c7ba87596bb73ac3700b19ec0874aa31d8 0x15c4d6e0a95507f3a98c0079f866cd3ea679499f 0x37d58d764e664c4b76633acab0e64b82bd5a9760 0x35b5fa5e21c5dbfc9da42f6e8cd70b1072282e60 0x7792880f326b5599e7ca3911603626df1caf2149 0x9e1e05bae1a9ed9aa9b5b4a3139f2ad3528691e7 0xbd7b70603ec3a1dd4e17e4ce793a5bc0b19e4f97 0x9b12a454c218103d624d6bf3bed9c961a236687a 0xe4569f3cfc297ec6ce27654d3d41b138c6e22f15 0x21acfe82e63074eeafdf5f029aa2003c36efc314 0x8d204d99f65aaff912f769b38d4bc215d8784c49 0x4b525406b7b1d30e4f47636a0cf7c9592145e581 0x9d5be40d8f17556773454f5ea5e932816eb79528 0x39df48ee46bc1239a8ce6171e5cfb63f0aac47fd

