ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-D160A257CA02
|
Infrastructure Scan
ADDRESS: 0xbf22c716169b057e07efdf7a57aac881259127a5
DEPLOYED: 2026-05-12 16:01:59
LAST_TX: 2026-05-12 23:57:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Requesting storage slots for offset 0x00… [FETCH] Received 91 segments of contract data. [SCAN] Identifying function signatures (0x85179ab1). [MEM] Tracking pointer 0x8325ac98 in memory heap. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Simulation completed. No state corruption detected. [TRACE] Execution path: 68% coverage. [VALID] Gas optimization score: 77/100. [DONE] Report exported to IPFS: f35d039f…c361debf.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x3396a775542d38774fab50e40708f1910fd5154e 0xd388fe6988de2a7b8f899330d4c45c8d7bd34abf 0x0b2ed669bdd67776aefc86ae13ed7b7af20e9fab 0x56fb46c80f272ed05e207a14360bb13c746cbd45 0x7176d9c3986db318f5a0897bb531aca726142df5 0xb7173eca8e277deeeb38fee2f1733137cd20446b 0x0b0d2b93fc4e67e967392fd8b1bb36da23eba17a 0xfaeb3e2315c79d1553a290edde771d0d0c65455a 0xe94deb47d6014e2feda71e577538e08f3a949555 0x2e072c3053cf07ad33909966c32066adb88274ef 0x19e9f9688d4f2019ca002f4dcfa706d0d6b93483 0x5a9dac66fc911baa9f31da68355540a464544d4c 0xa84089102331c5f11152ea778e769803780c6c49 0x33e30070f05a2bded10b222921e6c21d7295ae22 0x23b23538732746089bf5f679b5fef44dcc4b1fbc 0x4de313dcc65d3ed01765e320fdf44d12be28fdf8 0x3f816545c638a321c7bb56bb730c6087fd7a0e0e 0x8c6f4bdd532cce9f8c348fd7c37301893a6e1766 0x3b0e37179fc806302f4a15f85577a06a6eb38b4f 0x12c7134599893e95bb99456cdd82d884481b8d94

