ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-50F743FBCC71
|
Infrastructure Scan
ADDRESS: 0x7d155a2dc7459b3c9da3abe48af8499aef276f5f
DEPLOYED: 2026-05-10 08:19:59
LAST_TX: 2026-05-14 21:48:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Bytecode size: 9327 bytes. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Clearing temporary registers for deep-trace… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Verifying ‘require’ statements integrity. [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Comparing result with Triada-Security-Standard. [DONE] Log signature: 73c6a20280674c34240f0b63b8e3adbf5804707ebd6e95150c6d065701009102.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x6ebea7eed7feeb984ccf26633c9dc10194500174 0xbfb08d7058d336308b5bd8b727b7f9f0c3e212fd 0x1ddd1dc3874ec554ae79ad8fa9eb2f3c5dac22c9 0xd132498196f64754ce362842c61be76bc95907ec 0x3b72da5bb94f80a33af035044703e7a561cb1418 0xf8b08ba50a3463a80480e29b72419e09b254852a 0x4fd943520b508f5f3691b650e1a68c0e754a2e39 0xc5ac818e34df666ab530a8253d406d1deacfc520 0x8d5d614259cb4f1a350cffd227b682b29fc152ef 0x99889fb81e5c9b44701282a8ed6e2dbb63679cc9 0x3c7620b27f88057d20b2a3e81ea543389964924f 0xb2ede16508637f5e853818824d5ca1fb37527faa 0x9b5df94c404636c8399b3c4800d48eb3adf17d8f 0xff00bb7087f1f24f00ca4493e99d1ce84f7a8e21 0x2b4111e50c30621e9d8e601853fa717e58c71b69 0x2dca0a89723119c1547bfaae655d0f2fc10ef360 0x3e7884f9102fcef58ed5a1e81c16064e54693d0c 0x536470a61293493cc3a081566a983b3fac0ed463 0xbdf38d4791b6e7158b81743f5b7eab0720944d1a 0x4cba6a0df2046fbcd37751a9d5a61b89b076ea73
