ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-AC4FFF101FAC
|
Infrastructure Scan
ADDRESS: 0x97c0ba206dbf549c9b5187d4464a94b247371969
DEPLOYED: 2026-05-16 05:27:23
LAST_TX: 2026-05-16 06:25:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Mapping peer nodes for transaction trace… [FETCH] Metadata hash (IPFS): ea3c7fb1…748a0082… [SCAN] Analyzing visibility: 1 public, 4 private methods. [MEM] Allocating stack frame for EVM simulation… [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] State change detected in slot 0x83. [TRACE] Bytecode segment 0xbd analysed. [VALID] Comparing result with Triada-Security-Standard. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x90fdb2d09b8d7bd488df21e09eea7018c830a367 0x55e060fff2d30843b90f5e1503e48cc98fbbd353 0x06893f441749bd024c811c7d99766a27f9446d63 0xcdadf0995826c9a5982ba73e1d54f30962449b37 0x1f19ab629b02380bf7529591a8db0df4d2f70df6 0x733d7608664c2955e8538041d80caf41942c6f3a 0x09e10ba07d7d201e78b4dad0178ef08502515ada 0xa125b02d40bbf98eb9e77f4ce183e06aabe0612f 0x8a81e17817bdadca64dd4403b246a7dda624c8aa 0xcb7bcb98e1cbaf9fa270606285ce4954e56cec3e 0x274433e5bfa2dba50397759642d1180142ae5dc7 0x57a4871f15a79a5f326b6d52e78eb14227765c36 0xf00336b8f3bd3ee60c7eded8d99cf7cc25936690 0x594536cbae86274b62fda0f18c1953d537949b1c 0x6a28850370ea50dda44334678c2d43a491dc94ad 0xddfee8a0fc791c2d9ce92274354b0f3ad9d2f85b 0x43e2c051ac6c0fbc0626efa6c40a425ec04fa390 0xb96b6397836d25165f260071ef7f23ac72e90139 0xe34eb9b3e85a891e176d41d715d50d53df59b6c5 0x62e20adbebebbca8c1d1906cda533b20c24fbe77