ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-FB02B31F6930
|
Infrastructure Scan
ADDRESS: 0x53fdca91fd33b9131b5ceade42a3edbd9b38edff
DEPLOYED: 2026-05-05 23:13:23
LAST_TX: 2026-05-09 02:51:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Reconstructing ABI from function selectors… [SCAN] Checking ‘immutable’ variables and constants… [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Testing edge case: Zero-address transfer… [TRACE] Call sequence: 82e0 -> 362d -> f4fc. [VALID] Security status: DEEP_CORE scan finished. [DONE] Report exported to IPFS: 4618b429…1a88cf45.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xab1901cab3c7c93e12dfef8c6cfa4210dd58993d 0x8c91fd8ba2297599b6c346ea940e5a5d8837bbbc 0xfb22cc7b4c54146a78fa48f2152e9d9a74516a0b 0x5b7ac6fe8cab5e58d110746eb538a51039a5671a 0xf87d74c779dd18a890f168464df1afb67f8e7e00 0xba97cfd3469717574c621803fbce50dd16516b7e 0xef39d1bde925791fa77a9dfdbad699e574ac3369 0x0e5ae934826d9b2f7426cb9de6e828e800fcb15a 0xca1299e722ab2570d03ac459f8a9a6df403bd0b6 0x133451b0b2e35bc683fe792781dce41a175b6508 0xb861c94a09afd80875b4c8d25beef4e8e8f3bff4 0x6d0bd0d59d73eb483c119718323e933db8d4ec8c 0xd34559168966ea2b70d9b25b667b931a2e177ec8 0xa1831272e03aa6d1de2aa4eecbda6c5bf25c26d1 0x22e4672c1969b3194d331b1ef6fdfc6ffe2f09e3 0xd892fade754516e877a6fafb2a5cc17c12f5328e 0xfd5289cdd3a518d95338a2e1a66b31618fb0a7d0 0xfe88b7381d7f6d812c7a7a26205379a651c2858f 0x0eda9912860bce700a6773539e6f03303c7d44fc 0x466125f262b3e82793eca5813f51738928528604
