ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-4E355A95DAB6
|
Infrastructure Scan
ADDRESS: 0xff21ddab0e21d5f7ace741a360eca64005bc65ea
DEPLOYED: 2026-05-07 02:43:23
LAST_TX: 2026-05-07 07:36:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Handshake with node 0xf992eebc successful. [FETCH] Entry point found at offset 0xd99e. [SCAN] Analyzing visibility: 6 public, 4 private methods. [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Simulation completed. No state corruption detected. [TRACE] Return data: 0xcd50c1b6… [VALID] Comparing result with Triada-Security-Standard. [DONE] Report exported to IPFS: b914bad6…05c6a6ba.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x8d391c2f9ad0a2c71fc2d74df4b9c8a41de3a1a9 0x83188a9edf5d3c0cab2b6748a4106381b2379fbe 0x1bb988d81d64e5ce76ee6888343d90de7c3cc4c5 0x951fd20ef65eed5dfe27426b24a3bc4731461b64 0x4335dd5f878e44a687ef8f714e61dbdbd2db206d 0xe452d4f98de54e39ffe36d9a3740df792f9fc720 0xe4f1d1b35050efdf5ae5518ab1168827819055a1 0x4241afd7f5f8e35549dc39c4e4cc929990c6174e 0x97d3b9b2e0966aa1ba861e72bc8580bbb60cca28 0x248888c6c47707811a5f41f1a540fbf39798dfbf 0x72e1e69c11986f1db8c706029d8bf60a13cd964b 0xdf61bc7725cfcb843049beab8c9d584996e7d491 0x258f8e63d6aa801144f5338d800471db4a4eada6 0xa27dfd8611d8b4668bbe8701f375db263134608c 0xe200e1a7dff5f8c27f630961463653696f7396bb 0x03270562e12707b123e1acf6d16daad0f28c0c3a 0xfe96dd6b49d631241bc5781ee880e64b85b6af10 0x297b20759553bde999e96ec26a81ee1d072e4979 0xe70c6fb677fc64a65038c385e328d08ef2dadb65 0xd6f57826758b89011d40c6740225d7cab06ad3f1
Post Views: 5





