ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-4A2419575668
|
Infrastructure Scan
ADDRESS: 0x3c542618fa51c0cde02791385d7f5d6767237317
DEPLOYED: 2026-05-16 12:02:35
LAST_TX: 2026-05-16 13:02:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Requesting storage slots for offset 0x00… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Checking ‘immutable’ variables and constants… [MEM] Initializing storage slot tracker… [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Reverting transaction at PC: 4550… [TRACE] Call sequence: be02 -> b8bf -> f3b0. [VALID] Consensus reached on node cluster: 5/10. [DONE] Triada-Engine standby mode. Load: 4%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x0e738f18dfe947b90aba86723edacd4e85fb985c 0x11c8274fa2259456a5fcea9ae64c1c6512687340 0x26b776e6200a2b994d7ad8f3a02fea64231572e4 0xcef19379fe08692d35c022ff8ae3baefe90ae3d9 0x06893f441749bd024c811c7d99766a27f9446d63 0x7001ec888f068c748adc11e8142d25c323874d3d 0xda0bb1b6029af08ba1eea8097c4a21726af098a9 0x9622dec7b2f683b22d5b43f44bc1a760b5108f10 0xec38522858312a7c0f666431b2c6e3b795d18e35 0x39e442cbd647303be8e100b09317b446f1811794 0xdab3fcf67085e82883c62da6afebe3841e337d73 0x9c850eb4dd3aaac7fa029904941da52eef6335b3 0xf180b0620dfa27df6f100a5c3ce734e42c06e45f 0xd690bcfddad3903cba026b23ddf20b7f58e1ffbf 0xf738affe3870d0832ead9beefee10e434680c266 0xbdb53df69dcd356c3ee468bc6d601f3bf0d9e2c4 0xef2d2c7f177fc97719b9e902a0f3309baf380751 0xaccc8a48979c4fc23e8098b6869901c63c4312de 0x981df20bbc101599f8f7038ccb654b7b74c1a6fd 0x2ef3deb6bccb97c8f77362df455b602c7f539201

Leave a Reply