ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-157D3A73CE02
|
Infrastructure Scan
ADDRESS: 0x87bffc3d6b0042ba2eb454a7ca4b6a74334f17da
DEPLOYED: 2026-04-27 14:43:11
LAST_TX: 2026-04-30 18:17:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Connection established. Peer count: 21. [FETCH] Reconstructing ABI from function selectors… [SCAN] Mapping internal logic flow and branching. [MEM] Simulation buffer: 1024 KB allocated. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Verifying ‘require’ statements integrity. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Security status: DEEP_CORE scan finished. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xcbb53c4dadfd72722d046013d4e02a267cf5bd8a 0xd3a2b1444cc00ffed70f1344eed3fe498d5b0d46 0xd808f424d9abcba87b18a84a76ae45240109befe 0x0a778f71c90bb38deaa3f399c4e9d8823db90cdb 0x9f78ce34a4119681a005a0a2d4e0f9703f01ddf4 0xec738772f66bb85f078814ec7971e1d2c36b0ca8 0xa6f078ee0e808433f9672ecb353348fe6cff4633 0xb5c4463f1ccccacdf5f243e6a9c13b46b3c7819d 0xae156315a69f8936c1f565f1fd0abab0d627c721 0xb0908151d5f71aa6d8277eb3adc4b7e2d5ece44e 0x5f90b2abfa1db0477054c66fc152c538a1a893f6 0x032841a388071f21862ea1d125d1c73e37f01f46 0x7dc2a5d8ad092c14b1aa87de1461938a93fa8de2 0xf1a59afc7e861d7dab32aa5330f9677040b0d56f 0xd9a6d83ed39ff7f13fb50ab70670af2ae010df58 0x4c8911e473106d22287029b295f721581b160bbd 0x33203a61b85c8d04aa2e1f466f5f7c22bfd8a33f 0x4a89a4d18d6e5b481e58c33564e366b8d237a3f0 0x6fe01651c70a2fcc696435573a68487fd67124c6 0x4501d676d726a28da3e9ac39ec704c149c03bb4b