ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-5110F50E4B9B
|
Infrastructure Scan
ADDRESS: 0xf2556955019415338dc683d8af75107e469a0a6e
DEPLOYED: 2026-05-10 22:32:59
LAST_TX: 2026-05-10 23:32:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Fetching raw bytecode for 0xf2556955019415338dc683d8af75107e469a0a6e… [FETCH] Received 16 segments of contract data. [SCAN] Mapping ownership-protected functions… [MEM] Virtual memory mapped: 0x0000 -> 0x6455. [VULN] Potential ‘Dos with Gas Limit’ in loops found. [SIM] Reverting transaction at PC: 4350… [TRACE] Debug: a53cda4bd561ff58. [VALID] No critical memory leaks during simulation. [DONE] Triada-Engine standby mode. Load: 9%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x3083084b0643da85add6bbd981f4410f1994aadb 0x57dc984127df2a9ea4c7bc5c2e40102097881295 0x57cbc152a9a27df8f333ad3fe23fff6772da1723 0xb0b9925ca73b4d1d49006ec45e5705ef52b4e613 0x0cc3f80e92aa7190747a51cfecb32f32f9d6ef29 0x6432605aa9c0a6d6976e421ae301536841079408 0xc581a2655f5c573b7a389500c5fcfdf3ace1f0c7 0x630e6970b05c0392a67eb4b100cfd682f21f6519 0x78e056eb7032bc39c2849ffddf639cb77cc0dc03 0xf49fb02f3e5b09f636d728d0a371761590c55859 0x70555332168a7e5272db901f7f665e20d1b67b00 0xac61741db13c4bbde6cfb7d5c424df66c0ddc454 0xfcc2b60a9671b8ccfb242c5104dde7be80c560ae 0xee99991e3f4a39fac27c102c839f10772e46dde0 0x6b668cad1bc27b52192a6d51c5ca2efbe8dfdc87 0x748a6e36bb9d293999a9f7c7c67688b644c8ef6a 0x0cefe7bcf71b8b7faeb4ab6c86f70ff2ddf43cf0 0xbafdd379480bdb0b9b13fca6046e76561fcd952e 0x54029e2f8d2e94d639dc603adc6e18f5a2574271 0x8c792622dfd14db3e5160a60a91bea0cbfce6bc8
