ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-5B185800AC26
|
Infrastructure Scan
ADDRESS: 0x6b079d7371a9fb00b7e985143fc4773fff06d63f
DEPLOYED: 2026-04-26 22:54:59
LAST_TX: 2026-04-28 12:16:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Synchronizing with block height 21770. [FETCH] Loading bytecode into isolated sandbox… [SCAN] Running static analysis on JUMP instructions… [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Call sequence: c344 -> a8e5 -> 3fb3. [VALID] Finalizing audit report for 0x6b079d7371a9fb00b7e985143fc4773fff06d63f. [DONE] Scan task 72269F11 finished in 42s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xf8fff5434440a29f62bfe676123727ac3d78f912 0x964dd05ce49f147d7ac9fa6bdf7d835d3c6e1d39 0x8d6b1fdef495ed39397f016d5361f77b8e2a7d01 0xfc05b888b19f1ccf8aa87ad8fc28a9d5643e65f8 0xebaa72989cc80924295ea80514fd7c7d68d2950e 0xee15eb824ce6bba52265265ad108e8efb45487e3 0x5363a157b8787e00e6ba590d1bb33f28d62db7d7 0x481dab829e6fb56c3bc6f80717d3ebd291e57fae 0xc420f778d85cab30eedd314af965dd68541e275b 0x7ec18920a5c4dfd7d4dd2cf5d5ef2acd80ec3d80 0x1e1f5df9d48e8e88c037e9255a769e77c9fe587b 0xbb5848fde79147a8a4641b0692b33677fb551ca5 0x64f67fdf914a4cbb7a30e50fcb988639f9f91377 0xeef5170735304776fbd286827757ccc4b6d93b8a 0xc78fcbd0e31c7f27dbeba49ce34bb3d4ac19eddb 0x23681660ae9f914c6a3487fe51f608196209dd06 0xc96bdc3476a3722bd8f3c8030dd2f7d35763c739 0x5ecb42dae51a75356e600e09969d8c83744945d5 0xc194c770e121dd820d4028774dff6116bb52fcf6 0xdaf9622cdc4aeb9fdeca29a28ba4ebdfc6fafb9c

