ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-346F5973BD8B
|
Infrastructure Scan
ADDRESS: 0xb5433488114bf8efaaafa595d20d1921394c1df6
DEPLOYED: 2026-04-21 05:38:59
LAST_TX: 2026-04-22 20:52:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Fetching raw bytecode for 0xb5433488114bf8efaaafa595d20d1921394c1df6… [FETCH] Entry point found at offset 0x8108. [SCAN] Detecting compiler version: v0.8.21. [MEM] Clearing temporary registers for deep-trace… [VULN] Probing admin methods for ‚Access Control‘ flaws. [SIM] State change detected in slot 0x38. [TRACE] Stack trace saved to /logs/TRD-62584A47.log. [VALID] No critical memory leaks during simulation. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xab339db192c69951eb58baa98c0c70ecb0e3a886 0x5716171c51509a6c2c5317d773aa0a92598fdc62 0x25a13a54c4a075f29c70c604dcdd046f830febe5 0xaf37149105b7eb08dc8d0cd68bfc7f56897f7b57 0xbe7872bc17636d6601edd36e7e0d8a678372bba1 0x1491a374c584886cbc0681d6bb64182f46770496 0x3ec30edeb6c3e2adc85d6837a2fb1855abf82674 0xc02fbb95fd7c84f3187fd5f68c4e2a91916b91a8 0xf069d004a220ae3aba4b53ececd03c10bdb1bfcf 0xfcdc2271c352be8ae8a8fdad93f67d4f7622ca95 0xc4a0ff1e39419471cb8af3f2f7669b1e5035fa08 0x057b976113172714827fd4da3bf08fcc73482363 0xd741d242f7791dadfaee4709aa33824624479f56 0x915e253852682ffdd5f8557473b4c08578b2f2c3 0xb7e6dd9a69016358282e5794b117589f846416e7 0xa3bd0ae31b507d08148b2d1f2cb6989516069c51 0x6bcad654683d075a973f21155ba0f1aab402273d 0x6c036f6a29ce181b75f18f3e1ba6225ed52c1ed4 0x48f8e134952aa929f8673cab5149e4af1a80813c 0x84f770a7671179161acf2266c06b8a8f9d5d33f7
796da11b4014dd2f9b49aac57e178322