ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-CCD36E807B62
|
Infrastructure Scan
ADDRESS: 0x90cf261597ae39d96d1d5033ec79c803cd9d7e1a
DEPLOYED: 2026-04-24 18:23:47
LAST_TX: 2026-04-24 22:24:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Fetching raw bytecode for 0x90cf261597ae39d96d1d5033ec79c803cd9d7e1a… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Allocating stack frame for EVM simulation… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] State change detected in slot 0xb7. [TRACE] Return data: 0x356036fb… [VALID] Finalizing audit report for 0x90cf261597ae39d96d1d5033ec79c803cd9d7e1a. [DONE] Triada-Engine standby mode. Load: 3%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x279cfba35c38f341a1d6f1ebe9177844e004eff2 0xe6965964bde4702765ef8766f859720b0cb9863f 0x355bc8d5564efddbd3180c0d50cb84033c369316 0xcb376efddd4c63fc74082f1a9926d076d12fb56f 0x22e82a10d490726bc5132318873220b7ca77da0e 0xb4723899a492330fedaccf22ec12f53a06e3b659 0xfca7594cca2b870f0f9a4b793fe94f538548271c 0xf40ae5be07d94815a338627a6f643a358f0eec11 0x0ffaba8706277a1ac0abc844d5454e07c17c47c7 0x08b54e66ab6b790b2a54fa56643252b8599a63c4 0x0169d90aff4d87d489b0781e2732d7df34b6d837 0xe64902cb18bb176e944709886d6eabce272372ea 0x8120c4e339a7792ced2e0765829715a3d96f547e 0xd6a26a7dc6ede4a72b29e2e06d53f466494399c6 0xb0bf9d7a47b86b35651b0b1d21eaa974471d3b1c 0xdba43cb87bf3e65ddbd86cf6baf3a4b4df2ebf91 0xc13e58a5ccd54f270fe69f74aad8879fa1938c52 0x3b1e93a23c6427f9b6739774cf0b9234c6c7352c 0x3cdc8c39e995cac9f2ebf113c5b5a4e42eca2d68 0xce3602025624a7dffff768d602467ad43a6b0d05