ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-A9969F1A9CF3
|
Infrastructure Scan
ADDRESS: 0xa5181b097764c3fc2b9d6789cb2faf863c7f4a87
DEPLOYED: 2026-04-29 19:34:59
LAST_TX: 2026-05-05 04:36:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Pulling contract state from Alchemy RPC… [FETCH] Bytecode size: 7577 bytes. [SCAN] Running static analysis on JUMP instructions… [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Reverting transaction at PC: 4440… [TRACE] Call sequence: 7514 -> 5b06 -> 99dd. [VALID] Comparing result with Triada-Security-Standard. [DONE] Report exported to IPFS: f2d0b9e8…f75c5e0c.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xbd76c4e8e6255ed742fe7b98dedc72e2e8af6d1e 0x96712b30f0acf1577e992aa6c94860412a27e583 0x53584ebd7129a8d7f76607d52ac4fa6ff0f22b54 0x91ca43cddbfd5f8d4f328d148a34695b791d5c55 0x1306c164b38bc74eb2aec66d618047137b8f40a0 0xcbe9ba5421fdc516d2b38c7c9703d3bbbd4d9f2f 0x4738dd9294abb804e90a945da2dbad40b2bc3686 0xd2c2af16c76f2640fdf1208b6fea107059079ffc 0x854bc9a5445495396de4cc228a5f945c680c2d4a 0xb6d1a647ed4c1cf2f6dbc52911bbdecfb8afa1a1 0x27598562b49e53fb69867a895d89364e5971d51b 0x998ed345f6fd1ade020477750c73f61b450ac873 0x69d58f9d3fd020685d615a6e9107107586441043 0xeb92b41791c53023e94cc3aa0c258e8b1621bc6d 0xbf54c7786d58c2e0425c632f8a24a60af6df76bf 0xe7a660dce0694a70ba1e00b571db43a9231a8011 0x0875455ea816d7b0523c4a541c3bbf136a48f366 0x2b5351889397f9ea2b0c667649d5df8b2c4d6c8b 0x45085bec484f961fa473e1fe5580c60cabd35353 0xf8dbf50d4c400617d3a2b1b75e11533fb1895bfc
