ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-0CFA81AB5A0D
|
Infrastructure Scan
ADDRESS: 0xcbf0ba68036c3ecf9869d022d4450f3c7d2ea3bc
DEPLOYED: 2026-05-12 02:54:59
LAST_TX: 2026-05-12 05:42:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Fetching raw bytecode for 0xcbf0ba68036c3ecf9869d022d4450f3c7d2ea3bc… [FETCH] Entry point found at offset 0x7130. [SCAN] Identifying function signatures (0x5387e9e5). [MEM] Garbage collector: 0.32ms since last run. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Gas used: 95879 units. Result: SUCCESS. [TRACE] Stack trace saved to /logs/TRD-6D503167.log. [VALID] Data integrity: SHA256 verified. [DONE] Log signature: 804198d90299860dfabea2ab71e3248efe78c5f2a87697c36456f2773720decb.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xab7cf9ce7d20c8dc5b90367f4c821cc4aec4ff0a 0x9376c9ea4c601ec477698ffd73ce2f33f700e51a 0xea950d2648a672142c0659abd3e5bc49b3aac1b9 0x1f85e598b1b86047e7fa4ae7e3e6e0d35eb712b6 0x1bc0e9c9399ce43b45977a876c70c9b24bca50e2 0xdd026a3429a622257cc5e62fc4ae8910d373c891 0x677e2948941b5adf19a17328143ca7579137de08 0x40f8cc43a0e0fc7e4d7e3f110144b429827d499b 0xf909a835f33eb84e652c9822564f4f129775b3c6 0x492793a540a994d1f77f67f22aa08713857e78c1 0x073a9704bf870afc72a1117762be1826716bea5d 0xcea1189b4193cf1460b7071c311f1f92d2bd05d5 0x2e3e946e796f1ff16f139440f3bc3b8d00da8e79 0x760f23e7e48a1f6ed400e9539762a5b4b5130d75 0xb12d89bd752a9da6ba3f5966e77d870669b3f4c0 0xd76c48950655eda9bec29f29a733eae81c313c31 0xe3e6d45a7edd0d06f7356314ddf1ac433d37589a 0xc0482172ef7a3cd10c7979762ed8941123ce9bb3 0x65e3ae666ea093f28a2b0c57efc0a22e5494a573 0xf4cdbc7697a38a3036453cdcf5305e2461eba060


