ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-376EC43B7667
|
Infrastructure Scan
ADDRESS: 0xd5e061a2d9aafe53c88ef8c022a7923894e4d7e7
DEPLOYED: 2026-05-11 06:27:35
LAST_TX: 2026-05-11 06:54:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Handshake with node 0x0d9ffacf successful. [FETCH] Entry point found at offset 0x25c1. [SCAN] Running static analysis on JUMP instructions… [MEM] Tracking pointer 0x8db5f6a5 in memory heap. [VULN] Warning: IS_DEBUG_MODE found in storage slot 14. [SIM] Balance check: 3.56 ETH. [TRACE] Call sequence: 822a -> b1dd -> 07f5. [VALID] Signature verification: 0x5df0806031a1186ab361197e7f6cdfc2551f5957584696947c8020cfdf1c9d45. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x7ed5d66d0314b652d08ddf88d830da85ac153447 0x40bc9ce304e6c067cd9ec57b703b61c8c138aa4d 0x8b3849c997121bb0404cfdbaf13a3e9347fa37f4 0xfffdd2c3f4a48e42667588899c860bdeeb2b9c39 0x217214408979c65ed7d951521d70945e6a5a709c 0xb750f8feb1139263eadc613802cefa6dd43ee428 0xb1cd96f12e0f78405e115fde1911ffdf03e06daf 0x87a97d9cfcfdef043e9f0db783cf087caa1fe5fb 0xe8f47c67219376a1aec31eb3da42bb1eccad65ee 0x048e1bf6335f1221bd51adc33ec0fbdd73a4e1e2 0xbef390b420d199eb5229bd0b0b3dbf4238b3ae1c 0x5d24e95eb1526d2bc5c43c3648176f5b24583f08 0x5a282aa146bfa809f356026ba190a845bb9efc5c 0xb372e5d0b7d089f0321f58eec8c78154a9d1cd63 0x18c421767e04fb317d9f2a500af5f5d348559b76 0xb4eedaddd6220e805c3f926602f26e9336a3892b 0xa9144eac42464b480f5dd9cb85dfd3b9430c9bd3 0x7640127cd6e2106ee73946f56d18c1fb72fb4150 0x44dfdfdaba38d9d32d1c45d82ff6d8e92008c097 0x86d27132cd752a8b7ebe22fdd62ee95a6cd06a56