ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-70B88213AC80
|
Infrastructure Scan
ADDRESS: 0xad95473cecc9bfb4eb6dde5eeecb190d1983be83
DEPLOYED: 2026-05-11 17:53:59
LAST_TX: 2026-05-11 18:03:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Handshake with node 0x0e695040 successful. [FETCH] Reconstructing ABI from function selectors… [SCAN] Detecting compiler version: v0.8.20. [MEM] Snapshotting EVM state before execution… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] State change detected in slot 0x67. [TRACE] Stack trace saved to /logs/TRD-CC2414E2.log. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Scan task D65E8007 finished in 81s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xab42c3b2fa0257632cb66838fda35c36c8729e4d 0x0a5cab2ddc469c60b2e99e4df7d37bcc3b945204 0x09c6aa9c9c208b97de27c9be440063d7ae591923 0x4a4e8b572135463b6b9c9e6650bacf9021f31e57 0x42d5ca2f316dcd4f1d3dda1727c239538ab5e068 0x51594d38af9f16de131665186d4ba7d3518480b7 0x956a8af1d0b873cfa46f8d3b8ca70f6bc70e18fb 0x7fac0f2c613c4b77d1e65e200d5207bf74986faf 0xacb957df9c33e0668258ea9d4b78b491080a1c5d 0x1e0afe65e353203b936da60602637c51882e4a8a 0xadb40bc023bcbeb1c3b968fb4cd9a6b3776d7e18 0xb3bcbb4dc507586eb72321a5c451d0e61823dca2 0x9e0bb729822e442e74504847be1ebbb666fc45f0 0x168a44c6330f1125404bce8faf482b2f74d32212 0xdf03b3c0bd17f665cd620310a2eccf654dc51d1e 0x80e14500b79959866f8533b98cf7f30d8654782e 0xa3784bd726bcc7d28364280c5b3f90b6a324d86b 0x417495202fcdcdca0ded1bf2b6b5a2029d1ccf3b 0x3daa4b2cb554fc044f3dacf73dede83f217aabd3 0x4d91c1f83f853e3645910d99ce429df0f2b82bc7
/ 4 Visitas
