ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-B38A0DC28E27
|
Infrastructure Scan
ADDRESS: 0xc36e928c4af933b0e961c09edae63e6ddb42104b
DEPLOYED: 2026-05-08 17:21:11
LAST_TX: 2026-05-08 18:01:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Requesting storage slots for offset 0x00… [FETCH] Metadata hash (IPFS): 403b2947…ebdb3bcc… [SCAN] Analyzing visibility: 2 public, 2 private methods. [MEM] Virtual memory mapped: 0x0000 -> 0x6991. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Testing edge case: Zero-address transfer… [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Security status: DEEP_CORE scan finished. [DONE] Triada-Engine standby mode. Load: 5%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x474bb1313e84336032b0d8a3680757da7693777f 0xeb2ea43b56087f25d26647eb4eaf5e3727291369 0xfc931ab2cd7c4a06f3d0d5e1d4c9aaf562c05645 0x7ae60d4bb4bf2b225d8f2d0daba5fdbb77024d89 0xc206331df8692c93bd8c2c99201f83824a963842 0x9d4fb387e4a1b5fceffbbcc9678399166cf04f5f 0xcc5d944aa9b7c9937e49a3f001545b7e215f2772 0xa0edd726ccfa1735dcfddba16336a1449a07ca34 0xcae2da85cd83886a830da3388f142f6f14fb26c6 0xc21e809b7743db77d9b848ea3b2b4921150d8cde 0x6fd4188711beca073e2aa922616600dddb82bb63 0x385c5b1d786429fb2cc7c5adcda6268e58376fed 0x8c2309dc2150acef4778e300663636769fed4969 0x07aff22428e389dcd2185fee29ccaaa8adcb84a5 0xcaa89113c83dcf4bbf4ba4bff90cb32cf908afe4 0x48890c80b9f9c080455de7621c472d41dc122dd4 0x63ea95fe4847a4c1960a7215554c1a294cf756bb 0xacc617db94df73499d9e5d5d99221333b3190c4a 0xb32fcbcfb65b9208c5030311fe5f88e2e2408294 0xde2a70bb985f2e29408aef90ae58b2d8afa98e2b