ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-A88D59235E20
|
Infrastructure Scan
ADDRESS: 0xfaf4ff8981077a77b0586cc234e574977f0e61ad
DEPLOYED: 2026-05-13 18:37:59
LAST_TX: 2026-05-13 22:20:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Fetching raw bytecode for 0xfaf4ff8981077a77b0586cc234e574977f0e61ad… [FETCH] Metadata hash (IPFS): 7b5239ec…64b15c44… [SCAN] Running static analysis on JUMP instructions… [MEM] Simulation buffer: 1024 KB allocated. [VULN] Warning: IS_DEBUG_MODE found in storage slot 26. [SIM] Fuzzing input data for 34 iterations. [TRACE] Return data: 0xa03cacde… [VALID] Security status: DEEP_CORE scan finished. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xe296007fd2224651a463667c53cad1e3e182c294 0xb828c98b7ee5e8b708819cb28c867940c6b9a728 0x51ed7272a8ae29ca3be54adceaa11efc3f5ca893 0xdf7fe39e0f379596f21171d965585e32151060fa 0x0967d6bda77a9f1192fe14138859606f9e62d198 0xe1cbae77ccdeff45cba46c3c9c5248d2b3fce9d5 0x30cf77be88a62199eb3b3cef026957310bf3f9b8 0xb61948fbbfa1f0421680491e2b17929597617c6f 0x3f7986b146380b445d9f66c398a7d2fd66a64b35 0xd6b8db33941794bfbb770856af8c1df8868a1087 0x5d50888811c39e58ca90e91fabbd348892bbab18 0x7e2ab8f7134c32bb08b2f4ca0f78608fae79d692 0x8476d91a2def08537f69a9b0413e1b1aa9490818 0xeff3b7e691afb5b702dbcf5839d0b4548faf8570 0x1cb088e8411d933014795300e90d69efb963482a 0xcc737383eb91dad5e30bf316007a77cf38af6598 0x0b55e0d21bbff0bad82e56585f676c6daceb14f0 0xb9b7dc46185cd6132b7bf7ccb71eb404c0705141 0x777b86cdcc7a550929c344ce235850cf9b61f33b 0x2c140804b439d5f9d99b246560d719906bc06970