ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-F5BB50F8C5C8
|
Infrastructure Scan
ADDRESS: 0x2344abd23aabcb10cff29e859eb85c8d064f6608
DEPLOYED: 2026-04-21 11:22:23
LAST_TX: 2026-04-22 20:11:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Fetching raw bytecode for 0x2344abd23aabcb10cff29e859eb85c8d064f6608… [FETCH] Entry point found at offset 0x4332. [SCAN] Detecting compiler version: v0.8.21. [MEM] Clearing temporary registers for deep-trace… [VULN] Probing admin methods for ‚Access Control‘ flaws. [SIM] State change detected in slot 0x9e. [TRACE] Stack trace saved to /logs/TRD-1D74A136.log. [VALID] No critical memory leaks during simulation. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x1eabf52329d537ac15ecddd219abb102145a4e10 0x0049cc84c287e240d659512ec9b34134958c8727 0x7fb719fc99a737ba15d676a09491805cd9623a8f 0x0ff78d473ffa2a812d6c17bbdb63ce0bccb7c4a4 0xdd71d390fa6087d7ae3d2ae3ac9e5a6bc2e1e570 0xc698761bcee9365b9d32350e8d8d74f677b8303a 0x53e53de77f6ebe09ebab8d1cf2ef5b60a4dc64f0 0x71aa65f9ad2f68982d5eb131bd7cdbd643e08da9 0xb488c7f383871c640d0f396dc501cb9d0d44b405 0xa3226641604bb83cbc576931f67cbf8af45c72fa 0x29c293a6d4a33f115788c199fa4e6eb7ce4656cc 0x83fcd1d811adfdd63a92b9536deac33d9a984085 0x57c8bd59df1944715c366b62f2a35d9290bcc19b 0xf06fc2e5a66ffbefe5261b9289ff274a3bdde393 0x43169be9fb32f4c38dec8ffbbeeefd1e2023f411 0xc2127e946cba113eba01f08a29916509bbe65eeb 0x3e5c68175c8f6de891e0d05788adf53923b834d1 0x5e36fe4d5c46290296d116df83ed8321c8f5efa0 0xa860372272ee9872a54e4e2e22fdc68f24b827a2 0x9d79c545a7666079f5bf960ea183b6991258b4a3
796da11b4014dd2f9b49aac57e178322