ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-C9683F3FA0B1
|
Infrastructure Scan
ADDRESS: 0x393467eef7479158d02d0b175460ee3c04f66b7b
DEPLOYED: 2026-04-25 10:35:11
LAST_TX: 2026-05-01 02:00:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Synchronizing with block height 41755. [FETCH] Reconstructing ABI from function selectors… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Mocking MSG.SENDER as 0x866d10ed2a04527126b2744c5c39b6ef3ab2a72b. [TRACE] Bytecode segment 0x45 analysed. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Log signature: 69ded9ae48a004743333307b0a449781d022b8aaf373d2860eba58f8e70dde37.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xf33385f5343d1c8ad0cf1378f6ee4b8fa2f58708 0x3098e0f11dd105c42cb8c9ee7ed472ca7ed5e4ca 0x35bd25d60c594a77f13eaa4ecc058ea3631a620b 0x323ecdc58381d4608931421b1673ebc15af048a5 0x95e5c7d130f86c4b45493d0cf5837c88ebfab76d 0x143a08ac007df851353fbfd1c806ef2168e007e2 0x9eb4b57a03f35935fc86c5500ab23c05886587dd 0x1f79a05eb25fc80689b9bf3e7c8b3ca75fb8794f 0x04bde48c8af1757db68c502c4c58ff58b2cde0fc 0x12887eaf084c7b429fd8b3c2fa869bcef155f3c2 0xfa62740d01fedcaf27aaa7c782a039e3d60a8644 0x81167c2752d6a0d34e753a6c34ef292373777e28 0x5810094712827085246ad6cc0bb0b691218001aa 0x40a280129403024f16e0c03bd0da96709553af69 0xcf2a8bb0c1661cf41054c61a72ce3da4bcab8b4e 0x4fdf5a9b1984c3954a410e2b43b318af79bdd5c8 0x1b02ee7a57c81826ebc7586b388c8010cf905c40 0xd3244ce6f7cff18b96cf94b00d853898d88eb83b 0xb46272836bda538aa9f244387b61c15e62ab4adb 0xe5ad91e6ae67b8f18c36db72986a7d3f1b05b738




