ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-F9ACDBBA8C80
|
Infrastructure Scan
ADDRESS: 0x04bde48c8af1757db68c502c4c58ff58b2cde0fc
DEPLOYED: 2026-04-29 15:40:35
LAST_TX: 2026-04-29 16:21:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Requesting storage slots for offset 0x00… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Mapping ownership-protected functions… [MEM] Snapshotting EVM state before execution… [VULN] Warning: IS_DEBUG_MODE found in storage slot 71. [SIM] Gas used: 48621 units. Result: SUCCESS. [TRACE] Call sequence: f199 -> 4589 -> 19db. [VALID] Security status: DEEP_CORE scan finished. [DONE] Scan task 1C2E8928 finished in 15s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x2f56882c9f5110e16b3d30efd721a9ea5b10d583 0xaedc20daf7260fa6f12394b39967f1530b1a48aa 0x1561ce12d07ba087f9a2479e333fc0c9f592448c 0x5afaf7092f44dd0965a4e80687eca42ed74581bd 0x74086465fc0ec765fc38b92e0e94805000b1ada4 0x1306c164b38bc74eb2aec66d618047137b8f40a0 0xc13e58a5ccd54f270fe69f74aad8879fa1938c52 0x6f876214a9bca26b72c712a8b0c71724ba3b7c03 0xa6e8451fde16655e3132d1806537b7f9f2cd2078 0xb94f289d5fbea35ed808c548a8ea3079a1ec7d7c 0xde8d4fad0c6b283f6fc997858388f6c995928065 0xcd52313b25a580af8083cb03722e5b7f313c248a 0xff727d1341001739ac1dffd3ae9455ae8467a6a1 0xadbfd963b0d4d93c63cfb9c1f58814f5cede7fce 0x42d60b7487d7fd63cf17e421deeacd7c13364ecf 0x7a4ef977b28ba883499ed794de68312ee9501aca 0xda7d80f88c30704a3f10356c298b80ba14e869e2 0x280dbb8ead266d1c7512ad9996376a146872472f 0xd68832cde2f5d3311b88d224d84d43475bd489e9 0x01fa51406c314062c2e73642fa461f39d13ffe38