ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-66821AB9081A
|
Infrastructure Scan
ADDRESS: 0xbc5cd26cbbdd3f22bddb3950999ebac7d8377f22
DEPLOYED: 2026-04-27 21:20:59
LAST_TX: 2026-04-29 08:40:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Mapping peer nodes for transaction trace… [FETCH] Hex dump completed. Entropy: 2.14 bit/byte. [SCAN] Mapping ownership-protected functions… [MEM] Garbage collector: 0.35ms since last run. [VULN] Warning: IS_DEBUG_MODE found in storage slot 12. [SIM] Fuzzing input data for 45 iterations. [TRACE] Bytecode segment 0x40 analysed. [VALID] Comparing result with Triada-Security-Standard. [DONE] Report exported to IPFS: 05f3d0c7…c6139a33.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x72e5c938fe17d934758b85bab6fba912fee3bba6 0x76a26e563e9dd1cd5107e4e54330e4a89d4f129f 0x714d82e60ef785c2b0001ba661511ce231a54293 0x242a60b68481f836887eda6849dbae76890f8c3b 0xd533affc5986adb044d3d689c2eabc392870ca79 0x75d9ef48e30bcb0b658c1d387233fb52ebf9a4fe 0xbd066b1498423a6b19f9099d0cdf051bd89cc1fb 0x937845385226217aefbecd6a4da35b2162f91c37 0x74b91b26075787e7e0de38706a0b15d236662be8 0x26ca842c5490b93b88e4e5c7a1617e4299063a5b 0xb686724c8c745a839e60886f9fee27355f0935af 0x69953d3c7c62a362062b01594d7bb364c96cdbe4 0x087ee478b921e8e2f27eabacc1f10d46e01b472c 0xd2bdf0e3c37552c64b31f8b3b71624f84568a533 0x739ae9690402ab9cd3749cfbfa99774ea4b8084b 0xe7f93d8e59b8b8d6d14d0dab25faefd29549e62e 0x0b8a22cc6ebca8b5a8666c644a2c5d074984ec01 0x7048b3ce81280adeb1befddd30aac062e08eb081 0x9ec1d12f391428a0228e8aa0307d2f735596fe0d 0xe800acdcbc2ef423d19305398789591b41c60974
