ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-C73BE4BB2175
|
Infrastructure Scan
ADDRESS: 0x60eb778b179f20b046244926271fb3a8a2fd0f2f
DEPLOYED: 2026-05-10 08:28:35
LAST_TX: 2026-05-10 09:09:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Mocking MSG.SENDER as 0x9cc13012a1835ce85535530874e3df4b844d5dc0. [TRACE] Program Counter (PC) synchronized at 4047. [VALID] Comparing result with Triada-Security-Standard. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x7bebd0ef898faf327f894794ea894cf5b2741050 0x4a5b61335c48244b7df87e12f841703c145127f4 0xd09f71ea30109d244f6c5adaae5da997cbb1134c 0xc0826703580a279d197316ea22f768634c4675e6 0x8904a96fa5a37d3bdfb8c67b041995abc71dc4a3 0x2e80ffefe3c2c936ef534ec02539345a552467d3 0x78895952df5887910f9781f8c9916e34cd753033 0xf1eee16b4f0b8fe26b15e7512467a9dc7ce52cde 0xa607124df6a999103318c814afe1d7887f432339 0xe1c3169708f7fd909adbd5c4780f5815cd8202ed 0x8cb0776075aab37db67aa03e8f46f35655413f38 0xe0b31a6a72509be239b890a3778f5897472263e5 0xaafefb601445063f27cf4cb621201b84d6fdaadd 0xe5f33d935520132ef8fb6f5b9a390d0f65c075a5 0x07a481233c0673d8fd4eb769b1041f68a8305d4b 0x9ecc4b20ff30592291d994193fe109a3cce10319 0xee54fb13c1a2867714b79b4e9a1b03ec31e4edc7 0x1eeb591b9012017a5dca1593dde5f61850f76d47 0xc4ead8e908daab10b5b421c24dceda736962e021 0xb12a2ceb2576a538839f8436cbe8691c3d23c9c2