ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-5FFE685A235F
|
Infrastructure Scan
ADDRESS: 0x12908020bdb2252eb2dc8d3b3ec797d40f712447
DEPLOYED: 2026-04-22 09:26:59
LAST_TX: 2026-04-22 21:21:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Handshake with node 0x0113c151 successful. [FETCH] Warning: No source code verified on Etherscan. [SCAN] Running static analysis on JUMP instructions… [MEM] Snapshotting EVM state before execution… [VULN] Warning: IS_DEBUG_MODE found in storage slot 79. [SIM] Verifying ‘require’ statements integrity. [TRACE] Call sequence: d5fe -> 23e2 -> 2cea. [VALID] Comparing result with Triada-Security-Standard. [DONE] Triada-Engine standby mode. Load: 6%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x8cb63bb97fda239b2afcff9ce3d82ec23f66e820 0xcb55d17238f6a6d69b37861cc0ea7dd37218b482 0x1ebe9dac6025a5f551ae0bd045e4705cb1b2d092 0x0e367305507d034d8a1b6fcf8eef3d5e7b0c17ae 0x3ec30edeb6c3e2adc85d6837a2fb1855abf82674 0xacbef405d6747542e06a08d1a7530acf1edae464 0xa8b3779d9c686ff6c5b40f61781b0ab81f65ee20 0x3deb3653dd38ed5053b0849ea5e2345d18d1219d 0x9cabe855f973e44638ed7bad6ccd9738ace2aa42 0xb7d62d725aa1d4b291aa350dc4c852f0ffdc127e 0xfd167731dde599ed13993e216d375a5722d72c06 0xa5579091e6c258366f0979f48fb85e084de066e8 0xf17c0edcaa28371e9c8012d7699bf40ecf0f58d1 0xeea65d380ab61ccd26bfcc0a65bfcbddb99adabd 0xc7fcb5c89cce5894c3656f0cd86dfa5dbec16a7e 0x1c17cc10ddc5b352f7c6c5dda33b07769bff310a 0x18fa477057efe355e343ec2ccee4adb5b2307e54 0xf778b5dd4f9e7711e12833bbc8126772719dd0e9 0x7cd205ac4a263362694b46cc03ac647ce6aedd98 0x76b1bb55f1d04611e097912252b857d9fc5fe88a
796da11b4014dd2f9b49aac57e178322
