ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-A2D407A06BDE
|
Infrastructure Scan
ADDRESS: 0x55b7f1a2e6a9e006ade356a9eff7a2131102bb89
DEPLOYED: 2026-04-27 16:28:59
LAST_TX: 2026-04-28 13:54:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Running static analysis on JUMP instructions… [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Potential ‘Dos with Gas Limit’ in loops found. [SIM] Fuzzing input data for 36 iterations. [TRACE] Execution path: 50% coverage. [VALID] Generating cryptographic proof of scan… [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x04c688208141c459063b80946fef4f6e22a446cc 0x2d68a9cd06dd46976f011e524d9b85af388a6eca 0x08201bcec7990570e00969b41446379f6bb97da9 0xbd2b5ce14b6785a52cd2490080ea8fdba26bb8f2 0xa476615d25aa0ac5990fc8179fe8f457efc100f4 0xd77e2f38aca968978f86d8c3adae808e321cd32f 0x2bb652b76e448d1d94b110f6eb046464a1b347ef 0x82e23e1df983f1b12912d06239acc86fd1e03574 0x4830696ea721808c1eb066107b2bbb26997e9686 0xf25d21f9060c3fc8cfd7327f8d41c4ab8c76e5a5 0x534d4a2ec8095c02fe8bc73d97b17f87bc826768 0x0515640b40d6426f2c505a43663b03450f007d69 0x90a51bafb06dd178e8247b271c90fffe82f2a986 0xfdbb3011a1324229ba417a2232189d44d440faeb 0xea8be0918f4511c2e47515b25cc3f577e65a544f 0x66d55fba81e3152ef1b35038bdcf204cb9cd6b87 0x4e0dfe0c4aa49824e709f3149505b2672ca4279b 0xa9d49a1cde995c3294e9fd8deda525b1d438059f 0xccdbe011ab0dfdd4119b74c403a12cd1df481c23 0xe7df08cdd442aff69fa391e655b57110e26af23f