ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-B495D331039A
|
Infrastructure Scan
ADDRESS: 0x6f7f45a53a501bbe73e0096d6e3902dbc828691d
DEPLOYED: 2026-05-07 21:18:47
LAST_TX: 2026-05-07 22:01:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Handshake with node 0xf4aebffb successful. [FETCH] Received 35 segments of contract data. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Snapshotting EVM state before execution… [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Fuzzing input data for 32 iterations. [TRACE] Execution path: 15% coverage. [VALID] Gas optimization score: 56/100. [DONE] Scan task 58BFB6D4 finished in 71s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x4655b96d276dc9108e3360d218015b619c5970e4 0xc765dcbbee0df31db39aaeb9fad37f85c5e3a424 0x881d4c099f2b7df40cef05acc15c6ed5c20be2d2 0x70c5ec74317edfab13314b89342e1f70baca018e 0x64048d4d2a7efb66aa58ebaab7524032fea1ff6f 0x30cfc8ac2110cf1533fa49d9812785c57c5a1699 0x3104f736e52afbd73bf98d85bc8394759f44fb3a 0xd20524724b10c354506b20847ed3ce070591c4a6 0x8db4b7201448aa82c0f197c2625e198b98c6a115 0x894ea0e40dfa7f797708d0e6f957081da35cdb2e 0xf8e2d301ecfa8493cb7cff1dea0de1a220b0ba29 0xe789d5e83fcd5b0fe17cfbc70a1274c73549bcbe 0xa278594789fc3ee2ebcc0779f218c96e6a0589df 0x6d0bd0d59d73eb483c119718323e933db8d4ec8c 0x261d8cf7eea5cd050e4d93c8d836726dcca386c6 0xcf622073590d6352964fb6280b581c42ed9a7e15 0x8a7000a1f3c8d5b2e151ed63badd80d356559347 0x3fee588b23eb931f8a9aa0ee7a1d0144e61b1bc6 0x007f21e1a8b783b060b2f296efe195330b6a8a5f 0xa39b22e62d04b43768536e289a0887ef79b9f1d4
