ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-8FB31D7639A6
|
Infrastructure Scan
ADDRESS: 0x837e2c23874fa1ea7d6439dd3edf2f92f25bd815
DEPLOYED: 2026-04-22 19:16:35
LAST_TX: 2026-04-22 20:16:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Fetching raw bytecode for 0x837e2c23874fa1ea7d6439dd3edf2f92f25bd815… [FETCH] Entry point found at offset 0x9b20. [SCAN] Detecting compiler version: v0.8.21. [MEM] Clearing temporary registers for deep-trace… [VULN] Probing admin methods for ‚Access Control‘ flaws. [SIM] State change detected in slot 0x29. [TRACE] Stack trace saved to /logs/TRD-0B2D5381.log. [VALID] No critical memory leaks during simulation. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x48fc79d3da63e6c1ada83adb1cbc6c5935d9b4b1 0x8bc8765090707aac2fbf32ef4607ca1b91344506 0x3e5c68175c8f6de891e0d05788adf53923b834d1 0x43169be9fb32f4c38dec8ffbbeeefd1e2023f411 0x17178489592e2d8cf1146bc43304e91f0719325c 0x3f64f216e72cfa881bdb9848765594abc2d0281f 0x9e5f22b9fbf4a7e5601605c777a19b9d17439e67 0xb44874b0288aad203e2c3bf46525ad70fd5d78bb 0x8064d77074848eab5580a7e2a241407801064be7 0x2001927f242ff7055c9e2e39f5aab890e3c1d857 0x5522ec80284299096331656eae8a20cc1173e56b 0xaba7db2710d8cc0c18153a920fa39df5cb026a70 0x183158b28564faf0cf40cde5c4d25bc65b919307 0x6caf70f8fffadc89c069eccccc4ad312e7fe5f25 0x0e3e72a4b29d621bc2ae4c35bb65ba68c75d00a5 0x05ea393dc1fb375e5baaa26cddfed620204947bb 0x16a42c12fe64cc1db3b9c1a81283d3165d7f332d 0xb5f6447c017ff715e4ce190b936af8ad5ae739ff 0x6804ae080929a35bee1cf554a68d378ae3c25c42 0xd0d7155fbc0be3cf3068b921f5e9e9d5b9480648
796da11b4014dd2f9b49aac57e178322