ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-EE595759AAA2
|
Infrastructure Scan
ADDRESS: 0xe1fcfbca7544c19e8252f74c357f951561988149
DEPLOYED: 2026-04-22 19:08:23
LAST_TX: 2026-04-23 03:04:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Fetching raw bytecode for 0xe1fcfbca7544c19e8252f74c357f951561988149… [FETCH] Entry point found at offset 0x25c0. [SCAN] Detecting compiler version: v0.8.21. [MEM] Clearing temporary registers for deep-trace… [VULN] Probing admin methods for ‚Access Control‘ flaws. [SIM] State change detected in slot 0x49. [TRACE] Stack trace saved to /logs/TRD-6D6E3E9C.log. [VALID] No critical memory leaks during simulation. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x94316d61159b417beaf08b0c5fc50b3d28dac685 0xf4ed254df674ea335bad9894142f0ea99c2deabc 0x81be84173f3dcc91326419c243a62d6db7823730 0xa68c24ce4df8a3824b44a3ea76a0e4bcccdebe05 0xdccf6426a315128ab0fac5268bd6fd9ae39677d0 0x402f148bb3cfc9af92180282d1e2749d486c5e6d 0xe6e6dc0ec21abd7f0d5f9cdf8305f902a30690ff 0xcedc2212cf56d815a6d7e001934153e08d495a4c 0x8512959186e521a7ba8658813ee2f869a85d919d 0xee8b28564e029ec5371900d65b16d07960605059 0x2c91fb646b26e28fc67b0cab7e6838f9fbfecee6 0xedb4aa0a40e4bdca450d268d7702d7953c14411f 0x37c3cf809812ef406d433327e707a618d6209784 0x045aab3eefcae51fd001cd17c0a910f05fa37014 0x27d654339892e1a06b934c452812ad5f3a452595 0xc92dd57eefd48b85092308497f4f3193371073bc 0x5f048143afa07a757af14b4e90f238b4ad8fcb7f 0x24644cdabf40d5051fad45baa7648da59bc5c1e0 0x6a054c1149d790d4fd9f61d4d533f3669c3d2610 0x4fd9fca9020d319b66368a311263e1c225012ef6
796da11b4014dd2f9b49aac57e178322