ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-3CED1910F33C
|
Infrastructure Scan
ADDRESS: 0xbe277e6439cbe5d58822677701a6b7ed20e19a37
DEPLOYED: 2026-05-01 10:53:35
LAST_TX: 2026-05-04 21:25:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: F0158DC9. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Bytecode size: 4716 bytes. [SCAN] Analyzing visibility: 8 public, 8 private methods. [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Gas used: 46534 units. Result: SUCCESS. [TRACE] Bytecode segment 0xae analysed. [VALID] Comparing result with Triada-Security-Standard. [DONE] Triada-Engine standby mode. Load: 7%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x67f75c2d2522c8239d9acb57b982730db7d11687 0x897626882d3aa73c06a74af0b067b4890770702f 0xe8f6dd7f799f054b2c6ab5acd10f6526460dd7c2 0x3f2071d6f365a1040158c0afbdfd9e64baad67a7 0x93517e453c101d7957a245687788d635bf94e843 0xd4a6a716f83144bd126a33f44fff05a27465edaa 0xe2e6add00c2db9d7e788f4b483e7e9553e0b1c1c 0x82af750e29d2622794e480b3cb4625ab405a88ce 0x3f58e25c006dbce3feadebe80b36464f32415589 0x26cd93611db31911e2367e68c3ee546249d76fd3 0xeb46c31f95c2c976898115062a6caf19a4daf206 0xde54cde602ea0979202d99a779491f997a3a11af 0x4128618badac99beab1c855a5a3921dd8ad511c9 0xac5ec5caae727194db2524d3e72b9663def0c7d4 0x4b2551904b70cc3ada21a375fd78f6efbc6c6f79 0xac83bb21bb4fd615c44bd3b69a247e79ae5bd8ee 0x7476fabd67508ae6602981887bf16935b4132d96 0x60085082b73527cecdfa60224f73a8502892ead5 0xb4c34b253ec0bee13af9e220c6cfece0864c3a2a 0x49d7c15ffdebd6f3f31f4877dc8a6cb47bddb16a