ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-2099F1731AB6
|
Infrastructure Scan
ADDRESS: 0x9f87e49b2b62e123f639d017894b82e4e4a83ade
DEPLOYED: 2026-05-12 06:30:59
LAST_TX: 2026-05-12 07:20:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Handshake with node 0xbaa214c9 successful. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Running static analysis on JUMP instructions… [MEM] Garbage collector: 0.45ms since last run. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Fuzzing input data for 64 iterations. [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Comparing result with Triada-Security-Standard. [DONE] Scan task A8CB7232 finished in 71s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xc561b629fcee218ea08530b813cc77cac3903adc 0x7c1270e9354cfd1a51804143333ca6bf6516f91a 0xdafe2d6a48b3a4c3e1c47e51086081edba0ce37a 0xe61e6c30a27430e744d2f46b74249ebc307c24f4 0xe74f402a589f6d4795be1f4e9c3603ccaef12d8d 0x705301f99e11d6d6c7bd56296b8b5af4dbba0eb3 0x88067994fb45946ab87826a2ca4136caaa130140 0x24b2c2ddc0162ea3125d3d3a2803e0086959df76 0x6c9c9f05e868c45c4f819a093926626761549367 0x32ddd6cd37d204e119f300bf71f8c70ca18c7a1e 0x137ca97a5a90027f55558399b3b1f89f6580d378 0x0827d38ce0765e6d05e475646e8b837db07abee1 0x73bda1f2b7b74abb09fb48c6b96a005a88e9f0fc 0x2850e909bd1912f0f762b214447f4361292cba2a 0xd177a36a42aca46fb9c6116793f65254d0f5d009 0x3ae55830bdadb546f7035013f6240d6cd854f168 0x9aa317ddccc2293d9f34dd9c837e24caf43cbfa3 0x409ec5adca4b9f9e1b03e83519e834f939858b28 0xdfa857983a7fd2dba072ec2c979f16ea4ee34cfb 0xd7d3222dccbcf97051c68ff8f6aab38b0552639d