ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-977793C1A499
|
Infrastructure Scan
ADDRESS: 0xb89db281fe87b0ab7b80ed969ef1bebb9367701f
DEPLOYED: 2026-05-09 17:40:23
LAST_TX: 2026-05-09 18:32:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: B92C1C03. [NET] Connection established. Peer count: 80. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Running static analysis on JUMP instructions… [MEM] Allocating stack frame for EVM simulation… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Mocking MSG.SENDER as 0x2032aa8b9ac665fed098965fd7471b1fe22062fe. [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Finalizing audit report for 0xb89db281fe87b0ab7b80ed969ef1bebb9367701f. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xc60592e61a018bee5b9e7570cd861ebb862b7e9b 0x21c4988d3ae7f95591d7af46b0089de1a6f17251 0x36913cd512f7a8a329194bc96c84b5ed41e2a3fe 0x2b2b6967086c37e84c309770107c10f0f455f8d9 0xa18610b9c49127e68cac971851cbf729d815b4e7 0x419209e44d540c99b44f182a6ae56f095a7d7a72 0xeb86bf48f49b14170369faefb48b723fbedd0245 0x3d77f973d9d9f568676596b618b1f34fb0373e91 0x2383899b591882422ce236703e0b15157f5bf9b7 0xd244f1d8ad8a8d917cec69cea2aa5213d7c5c82b 0x69a0d394d72fffa69bb0211b501d70418f1ed2e6 0xe80c9c7170a3387042b4666b7d00dcdfb9940c9a 0xc2649495712d9b4e6a4ec92ba09c3ed5aca38480 0xf88af992c04c082816a534f3b5064728e67913d0 0x5065ad3548b25b772be362d0457831f92d496443 0x16edaef93b30969b1ea778cb979f36f1e5f5ea96 0xde4c685135beeb77f00596bb47584ee779a6af5f 0x2626b8523ff8041546b7a2b8ca00449536149a0a 0x20072084b893bec91a7eb172a19b3a44ee336370 0xca92c8cfcfc78bb53ed732595e51d7b0eccbd210