ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-3EF07BEA33FF
|
Infrastructure Scan
ADDRESS: 0x12a77658112cf42914cb614d13653ed5852da1e5
DEPLOYED: 2026-05-12 07:57:35
LAST_TX: 2026-05-12 22:51:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Detecting compiler version: v0.8.80. [MEM] Tracking pointer 0x8ecd1add in memory heap. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Simulation completed. No state corruption detected. [TRACE] Execution path: 45% coverage. [VALID] Comparing result with Triada-Security-Standard. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x8ed41634f043fa3d6e7508092f4edf26ccb209c1 0x17fe15417f247affc3009854e8e80a5074cbcac4 0xd6bbbc50d97596bee9bdaf1dec813c3bc0b48264 0x4c42fcc96e31c217e5247eaa6d3eaa625b1e027e 0x2b2f88a3847a46788c5f652be8ec5ac3778f0435 0x68779c2715b24f847b12f163b7c4f637709b0c04 0x3d75308bffb2ea32c82641c8493c6b22e89342e2 0xb9705b72c8e0cbe9290f57a721beca2035da6d90 0xb67ec8336500d5d44ec497e15945b67f71160c03 0x438d35838b9700e4da731ad3b1e6e16f8165b068 0xe989b6200ec9d8036166a41823c700adcabc66c8 0x95d00616867bed4b243759072001324952d83d21 0xd5b4f3089419e34a33b091e1771559c41c7e96ce 0x93907b71c92892420e0ffb0c253f77ecaa8d0279 0xf5190f3bfe6b86eb7a8c195ff202bcdde5a974b7 0xae02fc9e6505e568f965282f892f50d53b07e19b 0x532316ce54df7dd0323d4d3a58c83fb7f4716b21 0xabdfb15609b3e2a255e306969ee467b38e6340ba 0x6acc15f73af80086f5439537f9e39991fb06b4cc 0x76de9a9f026eba06d86cbef99030dd95ecce1063