ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-EED7F68DCC55
|
Infrastructure Scan
ADDRESS: 0x1cc5659764fe5f750919a4af264145a4013f419a
DEPLOYED: 2026-05-16 01:28:59
LAST_TX: 2026-05-16 01:56:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Hex dump completed. Entropy: 2.85 bit/byte. [SCAN] Identifying function signatures (0x9fb4b80b). [MEM] Virtual memory mapped: 0x0000 -> 0xa7c4. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Mocking MSG.SENDER as 0xe3bc598f37589df92e9cbea95cdcb8693b0a3957. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Data integrity: SHA256 verified. [DONE] Scan task 35C843F6 finished in 49s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xa2c685816648625d7983fb70e5b812ee27a4f673 0x2a69dc28f8ca9184f33bca0e7c049e6307828887 0x9bad80473f7a8e1ca06a8663c49ba5fef1f86f8e 0xc88f48caf799acba243e0e15d9737cc7227583a2 0x945cae60e2b0b7ca3c3651e9a8bee1001f09572c 0x16706c0d4c04b9863f5925936c49516d4e23bfd0 0xffbff2a17be0f14a5209f44decf5e0f0387e9218 0xe2236941f03a2e8420b377583cf02171f6e08c58 0x61a9c9d5f58e863129105c86aac02ee70d06598e 0xaaebe3755a46403fcc1852a0d803e108dfdbd97f 0xeb4e14d575b5ad95146b82677339d0d93af6913a 0x4e7ad961c6910fd972132d4ca40f76c67aba1129 0x1b10c180d26061f4f8a71944da37ccb227135238 0xc4460d72189e2b8c98166120efd9c6ee937c2fdc 0x3d06e6a6482d99e1aa21ab291dff57787f2971f1 0xb7633c985374484c6fea9ae09f72a8ee05e6df83 0xfb6683be54f360b6509e7c7452fc55e673e8aea9 0xceab530b04ea376ac3c4945733041816b55c92f5 0x445c302169cbe26694080c49c69554c17e2e5c1f 0x65c1a9cca3ea7c1ba3357670bda6ed756ec73c6c