ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-C0C67A4D613D
|
Infrastructure Scan
ADDRESS: 0x6c492a2f65e1989e296ea868d13687aa146f66a1
DEPLOYED: 2026-04-29 09:44:11
LAST_TX: 2026-05-05 02:14:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Core initialized. Checking license for cluster-node-1. [NET] Connection established. Peer count: 51. [FETCH] Loading bytecode into isolated sandbox… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Simulation buffer: 1024 KB allocated. [VULN] Warning: IS_DEBUG_MODE found in storage slot 85. [SIM] Mocking MSG.SENDER as 0x12c689c0d16a0c7e4d408b61bf6336e6b051245c. [TRACE] Bytecode segment 0x09 analysed. [VALID] Security status: DEEP_CORE scan finished. [DONE] Log signature: e6217a51912f25a41200fbdc3fcd313367ab6f9f37e62d255c64e3a3453e8d20.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x8c953776540e63ec2166407e7368cf872ba20df1 0x0cb8c9306c068214b6df859bd49e1ed86dae0a89 0x44de80f95ff63ce176c2f5a3cd20fd1bf0201f42 0x04899e1b42f626a9cf7d79686a3c2a72cc2ec63a 0x90ffa6bd698654fdee8a92171bc3b0926f281897 0xb3fe1ad025c3e11a6e678862a39d738eafc3b403 0x9ee80cc846a6236b4fb98d75008ab937ae42040f 0x9c919e8cd484f65937c4be513eb05708f4a6466f 0x524caf72b37d5d2519182f80920d90c981581560 0x68773d9ac4375ffc22c7b3ddaecd2d572adeb7bd 0xbda15939f9a3f30fcdd815bf8df774e092fd5b5c 0x04cee17d30c731bfe0224b843e0bab2d5f343464 0x2f0640f7f14f676c5ab648c4610a95df1345baa4 0x61fb3f970cd6683b6c60bcefb23cea7d63cf487e 0xcfbf625bfeadeb3648e4831e52976f004fcedf2c 0x3a0b021e0b7321055e8f6bcc553b58192e150bea 0x2ca7624d0e9ff6dffec7200347e61b5f6e7c66f8 0x1158cf1f9571ad0f3bd1e210b585026a1a236f37 0x8b07f1a5a1b47ef1ba44565d9237edbb25c6c2a5 0x7a05d03228eee1cb50bc9886a3d709fb6fa486a7