ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-C311CF01088A
|
Infrastructure Scan
ADDRESS: 0x03d50b03a72bbdc04666199ad082a544db5d59b9
DEPLOYED: 2026-04-21 12:24:23
LAST_TX: 2026-04-24 13:33:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Requesting storage slots for offset 0x00… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Analyzing visibility: 2 public, 4 private methods. [MEM] Garbage collector: 0.92ms since last run. [VULN] Potential ‘Dos with Gas Limit’ in loops found. [SIM] Reverting transaction at PC: 7668… [TRACE] Call sequence: 6142 -> f950 -> 1a60. [VALID] Comparing result with Triada-Security-Standard. [DONE] Scan task B50FB2E5 finished in 18s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xf0546d22c586cf7bad0e7cbd86583ef911a36f83 0x4fbf35575934431acf3b06b627176983f24c59c5 0xcf826b0f582244456965bed89f7a7708f81633a4 0x6caf70f8fffadc89c069eccccc4ad312e7fe5f25 0xe1f444ae7268971979f0b9c2a0e42920131c8821 0x0250a7e63fbd33e36e3f19bd7be413d9c436472e 0xd24eb68292dfacb71f40d563291a22729925f009 0x5a1e228d0fc0ad6145299d8f4fc213e34cb9d075 0x26e05b5ddeeb221ee3cfb723cfb124ea8891302f 0xc078aebc4c0c4fbb9477a5e55e9e65c975d1d93f 0x20fe1f14eb199798c56de1d3ac060164f6c21ec4 0x0a30ac2000baa486adb40e737998e139d3569f96 0x5e5ee37dce2569357b0c6afff8e03e1dd8345ee1 0xaf29f20c5deb3132eb9cc0962a28056feeeacabd 0x1a12bf7c340ecbfe9fcbe96e7b7c5b775ca29062 0x1c61487f93aab8b074d2636bd8229d0861471cf0 0x4cab60d8edbd897098c93f564d027fcf044b4798 0xd653a699518d7d0f277bae7ae902b7a265d05e26 0x8bb70b95c7a05b88b2ab5caf5fdb2ed221ebb44c 0xcd24167e0e68c0886dfb03f6e523efe9738ab256