ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-C11A7187FC10
|
Infrastructure Scan
ADDRESS: 0x321e677e4cb772094f69acb9e0b56baf4b4f5068
DEPLOYED: 2026-04-25 10:24:23
LAST_TX: 2026-05-01 09:49:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Checking ‘immutable’ variables and constants… [MEM] Initializing storage slot tracker… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Verifying ‘require’ statements integrity. [TRACE] Debug: cb4421d5c69320f6. [VALID] Security status: DEEP_CORE scan finished. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x2d2182607d471305442ff03caead80d49b2cd4df 0x589061018983d094607dca81cfa36af65b8c084f 0x875a77ee8ed7e6ca2af722d083244db40d4cb9c5 0xafe32535eae318c904b9cfd90be574ee1e4c48fd 0xb7d474b5fbb419b7df99eed8619dffbb0a5da2bd 0x34834ef78f4f17dd9a3a38409cca82111cea58e8 0x56d06158bb8d2e42a6c5994a9a12a5c6d642f064 0xfe399cf29d447f9c71447f6035f7747f225e2f21 0x3852a197295f21e79b0ede23a8a5a05bf0f87fbb 0xe35286eb796a68bb9af58d1cf61431e9f0514dd3 0x1250568931d17251a91c44dc8d05a3f5c0074505 0xac49c7ee67b6afe5f9693089e4b8f171d0432605 0xe5489c957bb27c3378b51abf9285630cab68b0f1 0xce42800574d2c5b6278b7ec2c246e8b9e4835157 0xce3235341530801cf510ee492db639ac2f7bc77f 0x01417c097ace0ca460ba2ff395659506b2d106a5 0xbd6f652f9149911452452a48a91fcc69bb0665ca 0x72bc9bd4bda2039f5fd95d46caa6da2262c65fae 0x9b486f43910ab7ebd4c646cad1b85a5524a8ff90 0x62c0aa9fb45fdad149bb5818db350646c5d37306