ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-F1F99C33D176
|
Infrastructure Scan
ADDRESS: 0x5aa8f0ff027e714922a3ef518598b478c1a5c026
DEPLOYED: 2026-05-06 21:39:59
LAST_TX: 2026-05-06 22:14:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Identifying function signatures (0x62698423). [MEM] Virtual memory mapped: 0x0000 -> 0xabfc. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Gas used: 50018 units. Result: SUCCESS. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Finalizing audit report for 0x5aa8f0ff027e714922a3ef518598b478c1a5c026. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x4eba974f8c3225962390f97a4aef679a3d35609f 0x20ee36e6c8a94a59f0ec229edb965695dcb5df1e 0xd22bcc3abdc0050662d3354ae01c65a68342f1eb 0x17bc84f250c705f5ec941b2b0dbc5fd5748f8ed1 0x7009d14ec6eb0f7a83e194363ef147ea3742076a 0xc8cfb25624d8c69929bec328a2b13809f934fac2 0xad989336bde9e7d51b269e237c57b726fb9112f8 0xe2a6fcd33de0931cd8fb38063e2a29b298420a31 0xa2b5fbe3131757bb3e8c9b89105a57d322a9f101 0x69f58e3dfb6c7545e19f3f6fd5f92e66052f149f 0x93669cf8eabe869687544de34b453063fb23bb69 0xc7e436b9aec8a416f79af97e8c3d2ceb4929b3d2 0xb93329ee48437401d9f424d0a85bea1c56575d0c 0xc1741eb0a6d4eb871665ac7a3b78bb65c6f0153b 0x2c7e644fcca5023a369a3f64239d8f9404398682 0xcedd0ea019ee78ed3304d061864665f2215c20e0 0x23fc43e8ed464dec568e495a9b235589d802a985 0x378d8771e9c66a2aad370344dfd4b65d1a3c1d8e 0xfaca48816da653c84006fe33163261400e0b6fac 0xd4bdcb12b70f18537469ebada3bd2ca0693f7e67
