ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-D553DE67F39F
|
Infrastructure Scan
ADDRESS: 0xaba7db2710d8cc0c18153a920fa39df5cb026a70
DEPLOYED: 2026-04-22 18:21:47
LAST_TX: 2026-04-22 22:11:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Fetching raw bytecode for 0xaba7db2710d8cc0c18153a920fa39df5cb026a70… [FETCH] Entry point found at offset 0x448b. [SCAN] Detecting compiler version: v0.8.21. [MEM] Clearing temporary registers for deep-trace… [VULN] Probing admin methods for ‚Access Control‘ flaws. [SIM] State change detected in slot 0xd2. [TRACE] Stack trace saved to /logs/TRD-790D2C74.log. [VALID] No critical memory leaks during simulation. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x9319811bcae275108c9b22f276f0064c802e1ac6 0x9777343d99a7c1c1d128b3dd686dbfb70052259c 0xb638473fe2e2ac93fd36f9dec9e69734a6a382cd 0x5cb652723d2c75848102cbcbf49dd485cf0598e9 0x5405d2362f63e214494364a49ac7ee55c1fd1a47 0x0f507ce1a9fcee618cb8bf44f523ce04186d8dbe 0x52a47e70d105eb80e2a92120c23e7c6a299a2bb0 0x372c072b6c4aad569a17160d0fea071d1477ba73 0xd6664d2accb369bb33cede6c573922fb5cc1ea24 0xe951ddb8c41e0c22f1082e3256de9022edcc2ec7 0x8d9a7e8c5cff8570797ebbbeb062720fe3a99338 0x9443659de7919aa66e9a98c3c4036eb58910ec74 0x4fc63f0746a52c443f5629a906738b931d791ed5 0x3c87b8abb71ceb70966c7bc046181a2d731ed592 0x7eec63ce9004702f2c94bbb5d6bbe1599ba50995 0x62c8a3e353593cff93e7099915bcd92edb5ab07c 0x88f59ac896a13e12310b9ff8f1eca57cf7f2bede 0x8d28118cb52599df28c4a27aa2bb335bc03cc580 0x8028ac7f34647d89413af4968f215d1fd8fc5ab0 0xa860372272ee9872a54e4e2e22fdc68f24b827a2
796da11b4014dd2f9b49aac57e178322