ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-488C7D17A6DA
|
Infrastructure Scan
ADDRESS: 0x6cb92d3630a10d229450378e93dee1c19a5bdadc
DEPLOYED: 2026-04-22 19:46:35
LAST_TX: 2026-04-23 00:17:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Fetching raw bytecode for 0x6cb92d3630a10d229450378e93dee1c19a5bdadc… [FETCH] Entry point found at offset 0x1cb6. [SCAN] Detecting compiler version: v0.8.21. [MEM] Clearing temporary registers for deep-trace… [VULN] Probing admin methods for ‚Access Control‘ flaws. [SIM] State change detected in slot 0x72. [TRACE] Stack trace saved to /logs/TRD-4075D773.log. [VALID] No critical memory leaks during simulation. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xaba7db2710d8cc0c18153a920fa39df5cb026a70 0xa860372272ee9872a54e4e2e22fdc68f24b827a2 0x1f05565d23442f2a82ffec953d52ee7d679677a7 0xfb25ba25c0c6a6b645656d37b0c877f0f355c392 0x84d3893d43282498401116870bb4279d93f412ad 0xdf1b93bdfb9786ab3a163ba833fde94079ebd555 0x86e49e3a96a42a30e66e193c21ce2278c4ca189f 0xb8e756b8bed9e505a69e9222927dd8dbad41afc1 0xfc551d518c86385f5cda3d1ceb93a7c489b6500f 0xa723d4e8a3ed629374a6700682dc26adab7c40da 0x06b921084edb73f369e3c39ec2eb5f2516f80c57 0xe3c1ac2ee24340f55740284feb97e81248280794 0x09124a25756223eb7a523a0377cc83dc8d22e1be 0xf1558667e2f157965954a64a790cb49a20979d80 0xf1b6bb2288b24310dca72c0d1e2c3ffbc634e820 0x975b9f8053ce236253b8bd274ae9ab69ddc27227 0x4a25ba7ce13566ddc4b8d04e69a8dac5bfc6fb97 0x8120c4e339a7792ced2e0765829715a3d96f547e 0x1e7d58365f88d3ceaf37c3e94924cc425c43da80 0xe20c7da6780bae52293961b8ee0a20cd961d85e0
796da11b4014dd2f9b49aac57e178322