ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-066E5008CF2C
|
Infrastructure Scan
ADDRESS: 0x956a8af1d0b873cfa46f8d3b8ca70f6bc70e18fb
DEPLOYED: 2026-05-10 06:15:59
LAST_TX: 2026-05-10 09:14:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Synchronizing with block height 76684. [FETCH] Hex dump completed. Entropy: 6.78 bit/byte. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Stack depth: 4 / 1024. [VULN] Warning: IS_DEBUG_MODE found in storage slot 17. [SIM] Verifying ‘require’ statements integrity. [TRACE] Debug: cdbd69a0f0cd55ea. [VALID] Comparing result with Triada-Security-Standard. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xc714263c4c82155c00fd1b71d376c91dad62f84f 0x7e59b8997f2296a703375d35c1127a35a39e3218 0x974f8a1cc979be799cdf3cc766e560a95673fdbf 0xf380d64521873cb5cab4309c85e79e0dcd083174 0xaef2fe972699d75a93eeaa19609c3f39ac089d39 0x84d04ce32ba6110bae57a6d0c77064d5a8cad011 0x015ae6ca972ee0808127ced5de0c401189e09a1b 0x15040d82336cbff49b00a3b1abeb2a062b2d9a51 0x28d06d3ba6be8f024205a1a3cb1cffb1f3fb10c3 0x8ac9856aa356f2606f34e59bb625debf9a995914 0x5fad9b003bfdd943f159f45f6ae02f23d3387af0 0xee234ceb85697b64800e696699b7841e00413b4f 0x90323dca414c0b342b70a649c9c3799d5f4b569f 0x4f5139adced4f2a43bad490341b8e3ca8aef23e4 0xfc0169fb250a243fc906dee3d7a537f955d78da0 0xd7c86c7eb83cea02bdf6b82885f20f77bb71b436 0x35ebde5ae169a5d656b0347d643dbc2e58c1d60a 0xdba23916794aa4c20bcdd5e69bb744a3d4268c79 0xe9762a3a1bf798cb9151945384f1e582d0613439 0x4aa78c9bbc99bcfc7fb6b99c943cba48119ed72b
Post Views: 6
