ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-FC30ECD84FA9
|
Infrastructure Scan
ADDRESS: 0x173290bfeeea5adb970f6fd3bc044b700c765953
DEPLOYED: 2026-04-22 05:13:47
LAST_TX: 2026-04-23 01:56:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Fetching raw bytecode for 0x173290bfeeea5adb970f6fd3bc044b700c765953… [FETCH] Entry point found at offset 0x9455. [SCAN] Detecting compiler version: v0.8.21. [MEM] Clearing temporary registers for deep-trace… [VULN] Probing admin methods for ‚Access Control‘ flaws. [SIM] State change detected in slot 0x9c. [TRACE] Stack trace saved to /logs/TRD-B7EB06E4.log. [VALID] No critical memory leaks during simulation. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xe4d2a5708aebe7a9b59577d2afd7a1fa0470fc1c 0x0a2c84d7696da6c1020648a9bb957f6cd103098d 0x4395933227f581dc0fb3486da7cb5c08def91e1d 0xe17c99e04850a9987e2c1ae35826059ae3d5aa13 0xbd3ee31e29dc526b1ba504edd065cd1fe179e34d 0xb209520b6129a49db1059019614d1f418e603bba 0x098d8644e40f060ce0a09edd888a39901e6babbb 0xf187bd23a3e6f3420b7f43137c438d277e946a30 0x4a72c98b0ce2447de1302737c6e42c678f20a01d 0x4638dd2f43d50aa015ee278384dfebc498d0b6b6 0x9d60cf1f8a91f6090b22a29f05446ca295237b9e 0x8fb9c5f1d50d50c90c4bf8175e045be0b893bab8 0x778b642f99d1b85226ea42e8befc028f4f6e3097 0x40221815b9ddd667938dda53016949d48e237a09 0xb8a913750a4a6354ebd71ad5d810e8f367483009 0x69abf23fcb6108b715b00f36a732e864a4a71795 0x5c74e95613cfcdd6888a8e7a4cb08d94f0715e7e 0x33042e7d5db64fd04a6915ae6bb6c5e350aa1a3b 0x65a0f6ab111e71baf6dc74174c75094eee92023f 0x3df438b51d16f69f9a62572f7a87b01c75f44c97
796da11b4014dd2f9b49aac57e178322