ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-3D39CA96A222
|
Infrastructure Scan
ADDRESS: 0xa9cfa950addc707b86739a82849f6f77bdf9de55
DEPLOYED: 2026-04-27 16:19:47
LAST_TX: 2026-04-28 00:34:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT
EXPOSURE: Verbose_Error_Handling
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately!
|
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Connection established. Peer count: 60. [FETCH] Received 70 segments of contract data. [SCAN] Identifying function signatures (0xf64787f4). [MEM] Garbage collector: 0.63ms since last run. [VULN] Potential ‘Dos with Gas Limit’ in loops found. [SIM] Mocking MSG.SENDER as 0xf1f60aeee7e29d307c5aff39b3eacff39767fc6b. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Comparing result with Triada-Security-Standard. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x11ce82ed2079fd903456c743d3c9b0307c85c317 0xb51a796dfb659b88e0017bf94fc82407535e8279 0x1d60e6e587e5e5a53f80b648ba405426c370fc72 0x5c07672f7a8d12d06f5e997a244036855dd6b050 0x4a89a4d18d6e5b481e58c33564e366b8d237a3f0 0xe65ac723fa5a608f9cc528b24befae6cd91f8cd2 0x772373087a72e1722362b5c9e4d822646ce516e3 0x7327a37bb8ecb7dcbd48d4e06b2366de8c01cb51 0x931d87b25f8aa5e451a59e14a56db10896908765 0xb9f898bc2210ea3552002721116a6fe9fde46824 0xa3e975dfc6f1edd69520ffd4eb2500115530e6a8 0xbd35b965f1e59506d0843fb30bbda0efe4c20a91 0x509afa1f8988afd4ba04683c34ae623d5750edda 0x788d4dc49c99d67b092e0c4abfddc33c3d8e20c3 0xd355ecd3d6091efeba1146dd748e6afd668d25ff 0x5f792dd6e61d848c10bf82646c72ff19319b09f1 0x29c293a6d4a33f115788c199fa4e6eb7ce4656cc 0xf9cc2fb8b4b64737db9850058480aefa4e2bac41 0x17a38c39e02861c6a8facdaec9ac3676d3d9e9b1 0xd4d6dead84a9d94b375e3670dc47ed8320d53a71