ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-3EE510BA02D9
Infrastructure Scan ADDRESS: 0x8ebb2139ab06b249adcfa3f1f6c59f6f4a932402 DEPLOYED: 2026-05-05 01:26:47 LAST_TX: 2026-05-05 16:54:11 | Compliance Status STATUS: OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate VISIBILITY: UNFINISHED_STATE_DETECTION |
◈ OWNER_PRIVILEGE_EXPOSURE An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! | > Execution_Trace_Log [SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Mocking MSG.SENDER as 0x8e59f85b3503b783c19fc6c7e8cb41268a986580. [TRACE] Return data: 0x4df49d23… [VALID] Comparing result with Triada-Security-Standard. [DONE] Scan task 1DE22DA1 finished in 42s. |
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x9f42d2213127e95b63d3308ba8d2aee488b7dc84 0x50cb2d03459ea7d5f5772645768404d067276144 0xe2a26b468a2e8a8bf8116c71cf589ef801401d57 0xa46069a5202fb5f45d400976aa7dd2202778369d 0xb89955a186e80c60f922d40d050e4535c03b69d7 0xf9ebabd04ec14032c569d49c59e58df0630b6b7e 0xdc7b7dbaa48b3611061c032e5b80bed032080a6a 0x34d4bd3d3424b4c06ba14d68a10e1dba5cfb11d4 0x1d0a6f7040dc78e87d97a6e5cec0fad402f3ba74 0x2b7d1e5e71882480f6f15175c81553b922b10077 0x820adc1d6315fe6142cb2b5606287fad243de213 0x9fe0f84615bbf7dec104286571600d7c6a40bfa7 0x883332e68b308d407d472979777417459b047d3f 0x23bca2b01465af02bded11e5431569eec3fa923a 0xde820d6d62dc05ff8b0ec00360f0a2515ae85d4a 0x28ca344fcca0d1f445506aecb7e9af4ff4b90fcf 0x2e9ae3477ec8c4adf8f1ffdfd58b20a0bc96d377 0x47c1d82b36385f4cedfb618bd4c72da5655064ce 0xe12f0ced5c7e802173fbd2cbbc4148ebbee8667c 0x161735edbd4a12c9c90430fd156cd6f17862a099
Rate this post




