ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-16B8A1A2EBA2
|
Infrastructure Scan
ADDRESS: 0xe951ddb8c41e0c22f1082e3256de9022edcc2ec7
DEPLOYED: 2026-04-22 02:15:11
LAST_TX: 2026-04-23 01:23:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Fetching raw bytecode for 0xe951ddb8c41e0c22f1082e3256de9022edcc2ec7… [FETCH] Entry point found at offset 0xc76b. [SCAN] Detecting compiler version: v0.8.21. [MEM] Clearing temporary registers for deep-trace… [VULN] Probing admin methods for ‚Access Control‘ flaws. [SIM] State change detected in slot 0xcc. [TRACE] Stack trace saved to /logs/TRD-BEDC97D3.log. [VALID] No critical memory leaks during simulation. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x65b0f8c9d7d60e9abbdbd1268e58e296be48bea6 0x09f154270f363cbe6f9cf854bdd3a36c079ef21b 0x1d9be87f17f9bd95902c6e697e6248a5f1cea6d7 0x2f4c1c40157dc24737d25f0f0c9bbe5b46a3ac9e 0x43d20ef73b5dbdf4bee89784806549b27db1b36f 0x006aaf5fa17efa5cbcd20a1ca319f0997f17ab96 0x4821f039de76fbea7ac2fbf3ad6248249d027ec7 0xaba7db2710d8cc0c18153a920fa39df5cb026a70 0x7bd834039eabe9491d8468cd9b9577aede45b44b 0x174765935514017d75f3d207982eddd2d0a189b8 0x9d33d8b951aff652137088187196a6851c840698 0x56a719120d21639470f511aae6686ef9886e8813 0x31b6e0a496f0b9aeecf44f18899b5efa19c7f9bd 0x02a78babaec0ddc183d0bc25ad084728e085b590 0xdcc158043b0f485eed5408737896e2b058233da5 0x5ddb67235fa456278c06abe0a74b1ea4d6077fba 0x211f0be3b45c4d60cd6e82beac05b3d03bb1b472 0xfb805f2f88e862e687bebdf120306ef39380f3bf 0xd83951be8719e75ed9d2362c1aebc8734b646b76 0x41a5b05e863e594cc95e8cb2197edc0b23e6ee99
796da11b4014dd2f9b49aac57e178322