ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-5325C5BD6C1D
|
Infrastructure Scan
ADDRESS: 0x160960fe96d3d61d606c4ce5d39d0bb63758303a
DEPLOYED: 2026-04-29 16:23:11
LAST_TX: 2026-04-29 18:42:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
? OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Requesting storage slots for offset 0x00… [FETCH] Metadata hash (IPFS): c70240dc…2fd3b2a7… [SCAN] Running static analysis on JUMP instructions… [MEM] Snapshotting EVM state before execution… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Gas used: 88977 units. Result: SUCCESS. [TRACE] Call sequence: 037b -> b419 -> 0734. [VALID] Comparing result with Triada-Security-Standard. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x8d2ce0390a09f63acece70bf3a9b6db8139e6b65 0xf3fca6c894a76e8eba4e5a9c28298b8ecab811b0 0xb3e1d105fdb7b9ffa1bdc823ab370273daf2b5f9 0xc140f2ebd3d0c5ccca0f3a9c164da6a6428eb0b0 0x057e3efca6f9e7094584b176f3e69a4f4b594d04 0xf7940991262f0dd6c1ca93256e13ff8b1f7edc71 0x4a6f6a2fd7e3476582529e1a898a2bcd56bbc5d5 0xe5122be9ef2250446517394367d1de1f88adada9 0xc3848cd5bb4c507f65be6ca6b4ddac721be11d74 0x6091236ae5a173213b3bbd1a6ab7e0da80d8d2e0 0x5f24b17eb2850bb14f8e842daaf8c2acf11b7581 0x85518bc4956cf1127032995276ed133ab57b2c76 0x13bd70361f5b99c8d618d7c57dfd9235c549bf62 0xdd3e47cf0d389a991206df443bfdf1d848481f59 0xefe517a97fcd79076fefce95b02937b31693b754 0x6630cb54287eaebdb00d2f5d95a4d953600de442 0xa9fa350f7721eec03129ebced898d15fd23406ce 0x6e8addba5f4ca2eb304bbe76411c22b54a47fab6 0xc504782170ef513a284ed147b99a0db1e64d1bf0 0x5d47d722614b1f3078200289f158f3d8929f7d13
