ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-EEE6FC856A03
|
Infrastructure Scan
ADDRESS: 0xb9467cecbf358991252d404ce7c63bd36c21ca3a
DEPLOYED: 2026-05-01 14:22:47
LAST_TX: 2026-05-01 15:15:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Synchronizing with block height 91420. [FETCH] Successfully retrieved runtime code from blockchain. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Allocating stack frame for EVM simulation… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Simulation completed. No state corruption detected. [TRACE] Execution path: 86% coverage. [VALID] Finalizing audit report for 0xb9467cecbf358991252d404ce7c63bd36c21ca3a. [DONE] Report exported to IPFS: 2d937755…cc59b0c4.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xba798080c2180af009da1294d273af6c881e1a66 0x26f8f9365da4bce05f327e047fe7c5a4ed95e3af 0x714eff2084e0ba41ba130d9a1bce5b895da24fc2 0x363577192d1172f6b8a443020d48c14e4913a431 0xcb07a09eaf4abb4605a28bba6044a4b6a2775e87 0x451a0778bb98475f1d0ab1d9954684a8bc8f416f 0xc6fb84ec84fc1021f5bcebe50bd0ad2c51ac814c 0x93499c9b4da6c8ff674d1e85e0976df43b3d5524 0x6da9e98d7c6a7f27bde79826ed43afe6c6d2d3a9 0x8ca57e9b5190a9cdbb840072234b9404ed93a994 0xb4621df93c9c929adfb8f3e36a1d915b3368f4f5 0x3cb03c96e9cb3c416f8e9f60c0a5677424720b58 0x44f8860e5ef4d1a853318c49be5e70c51909dbd8 0x061b598ad6c9a746936380c6c468cc15131c85e2 0x22aa279375f454f4c7b4e281e4d18d17c5d5c167 0xc0727b432594418a28e5280e9ddb56eaf85d5fd9 0x8700a7ea7db9cd3f61a37856572269e00a5c5b55 0x204c18785706b565a6109f675277f59fb4520f08 0xd425c2446cae326b01abdd38cfeef9ee17ed75a8 0xc5c332cf4df09105cf9efcf14e25f793e08668b6