ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-A5454CE788FE
|
Infrastructure Scan
ADDRESS: 0xb481d8a0836530a6ed93cd27bb8ef6415d7bebee
DEPLOYED: 2026-05-09 18:50:11
LAST_TX: 2026-05-10 14:01:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Synchronizing with block height 21084. [FETCH] Entry point found at offset 0xbf01. [SCAN] Detecting compiler version: v0.8.20. [MEM] Simulation buffer: 1024 KB allocated. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] State change detected in slot 0x82. [TRACE] Execution path: 12% coverage. [VALID] Security status: DEEP_CORE scan finished. [DONE] Triada-Engine standby mode. Load: 1%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xe887f639a9cc97bfbfd9f5fd7c404fefd2a777a1 0xc26762bc5eca8cf030f3ddb7f61197e81ade0ce3 0x45e9bf4f040545c3e82b98e8b2f5f4b07d0824d5 0x7b8d008c5887b8e697d9afd9a25e951482383fc2 0x96575074f0f7b8bf251b6412122ad19173ef778b 0x630410ab4b3cc64a986e224a59d1339b9c25bb1d 0x256a8cdaa7329027e98928ac721bcd97a86fb4fe 0x5c7a73eb17c7d29e93f2d7e3a3aea0e0635a22a2 0x82ad863926c30c9c66d114fc6af5efa57aa21832 0x03d72724b165f5c3dfeb2a87bde79e1f6ac0e1c6 0xc0029251be9d02def551e7dad950d7c9586803de 0x655afc46160070070c0b991f59fc96379c89cc1b 0x186502fe5329ffd3b46992f30b2fe4bdcb694d3b 0x0762d55cd2f099ae4b7c4b9c158b652a4b07b478 0x1d31c18bf24270db4c955e9b722935ed249050a0 0x8626106e1c160e764c38974c442f48509bf815a6 0xa4cda32f47a5821d42c511182a2fea9bdfd38ae2 0x4e98a1a038831b7d756ea9214508c4b34f4e4d3a 0x1f7e81fb3a850fd22bc69a1704402f6b2767b9e7 0xb3668d59a8b5c55260dfff33ea9d00e15a2fb1c3
