ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-0C65993CCC39
|
Infrastructure Scan
ADDRESS: 0x3b1f69955a7f39d298083f3e60ea12560208fa08
DEPLOYED: 2026-05-07 10:48:59
LAST_TX: 2026-05-08 22:27:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Garbage collector: 0.14ms since last run. [VULN] Warning: IS_DEBUG_MODE found in storage slot 15. [SIM] Gas used: 92310 units. Result: SUCCESS. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Finalizing audit report for 0x3b1f69955a7f39d298083f3e60ea12560208fa08. [DONE] Report exported to IPFS: 2df2ca62…d992c287.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x4f7a660e7b4e6eff6779a1014337a0e757fe4ba2 0x6fcad44c7ad97d90ff3e2eda2bbc446c8ca0f3a6 0x385deaeeeb2539efc9aa70345be4667a4b594b83 0x6500f597644017bb20e8e59c2de7b78649a8bfa9 0xc020589bf477ab9b8400fb1f7effb35a547b12fe 0x44fe3ac195428129a7e3e9f174919116ee4eeb90 0x9330334e9590d373f819fdb023d0476aef621118 0x9c8a7f348dc444e207a034dba3acecdb971a9f3f 0xd22bcc3abdc0050662d3354ae01c65a68342f1eb 0xd6ba5bc529922735426488bc75b22c269cb59c8c 0x87309d8cc806d6e77f6929594a0595a11ddc62fc 0xbfd474b52008b17bec28878bb0ac70b9d41d73ab 0xa3cf527de3d8841f4cdfe37cda45942e2db22f1c 0x6884934abe567cd40ea8a08e45879680aa31dfa4 0x7a5d48883cf471f94674d5a7c284f0bfe21e1ba2 0xdc1f6bd414062e925653cfc5c58a9e74830b207a 0x3b1d2efbc95457797383bec8bc218440255f6efb 0x72a3021f037e8def9f2aa57d7b3ed786e7b283bd 0xc4080ed7d41b0f976e61770ad988f46e8aa8013f 0xd367ea72739c47d5cec70c8b2f2e6409c47220a2
