ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-CD3B1C72E730
|
Infrastructure Scan
ADDRESS: 0x9e94d86895e100acd27d2c1697f0acd8efb29cf9
DEPLOYED: 2026-04-26 03:28:23
LAST_TX: 2026-04-26 04:09:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Fetching raw bytecode for 0x9e94d86895e100acd27d2c1697f0acd8efb29cf9… [FETCH] Entry point found at offset 0xa968. [SCAN] Mapping internal logic flow and branching. [MEM] Tracking pointer 0xbec8937e in memory heap. [VULN] Potential ‘Dos with Gas Limit’ in loops found. [SIM] Mocking MSG.SENDER as 0xf128b44f35aca53fe11302a8e6db2fb1e5396670. [TRACE] Stack trace saved to /logs/TRD-C1ECC60D.log. [VALID] Comparing result with Triada-Security-Standard. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x803cee85f7d89136ab32e264ea8943170a8e5926 0x44691c1e507190c2ea5c2554300719aee1520257 0x9f6bb80d625025c81c661564f5080b3ff0a21166 0x5208fd109b35c6809c390907e3f55adc0de700e8 0xd7fb05f48ffc2b72456a82641bcedb6d04f7fbaf 0xb0fc2f9de5738449d9b1f7c306527e8d35f4ce3a 0x0828a11118bc70fe123f3f02537ccd9c4dd78452 0xcba39dd769fae9f03254bc9a3a5e1564c847b270 0x238941cca6b39c4c1090fe8b6ca6c90b590f3e5a 0x412f650b2423b072a5723447a8b2fb48088983bb 0xa86e378b2cbf2c66a1dcfb942b0d0fe84e460ba6 0xc4e82355c9d50f73766617f687c6390e83773ca1 0x509ef7ffc39c63c3e4f6d1b04c28f2ae44256a0a 0xc8ffff41ae6ca7f0d17c61dcb7cdd0b0b89e16af 0xa0d6c8f8b0da1dadc177af7b1e98c8f77c3ccc6d 0xbe311561534a8ca2c2aaab4b653311651a5ca305 0x6f1ae4fd9dc2936edba64a02c09a62c08764380a 0x6a893d5722568d63b99aecdeb9acd6438cfd53d5 0xf81626a92e70116886f6628a373e00e943b93965 0x7a7b2992e054a6a45f538df3956b90c053ea9bb2