ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-6AF96B94EA53
|
Infrastructure Scan
ADDRESS: 0x1a7d91785e08b67283020f8166d8a9ec995b426f
DEPLOYED: 2026-05-16 14:01:23
LAST_TX: 2026-05-16 14:46:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 9D4CF785. [NET] Mapping peer nodes for transaction trace… [FETCH] Reconstructing ABI from function selectors… [SCAN] Mapping internal logic flow and branching. [MEM] Virtual memory mapped: 0x0000 -> 0x932d. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Simulation completed. No state corruption detected. [TRACE] Call sequence: a251 -> f896 -> 7678. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x37a18360c58d0b4229fc1e6c7d43b0bc7c0d296e 0x861994b6a13f9debcdeada3c45f9ebd9320cd90f 0xfa7acb3103bf1176675cc60525344df047bc6e40 0x4d0fcc2b994391dd7a6e15d75fd22fde3d30ad61 0x960f87dd021cdbac8664612ac37cc8bd61833c42 0xc4acd372bc3ea7f04cc4f301ab8428a48695746d 0x6083904e5757e681e8eaf5202f046cbab170cfb5 0xd854ed90ac003b56e6e1ba35abbf33229c2012f8 0x2b119eb87b805b4e8d1b0c8b770d744603a310b7 0x36f4657bc1f38045c4800447578741675387a417 0xb70e03b7ee88174453206a06acde6f9585c22fc2 0x74ccaea8b5489aa4a5ea164b5f4a02aa62f167ec 0xc03fa47f06d8719e7eae73ae8aa20c19cc439ac2 0x8800764b35b135a3c7820986014cf646c337e1c6 0x8fcec7f6fb3cf9b0063b38e2a19987a6df5ab8e2 0x35f8b7729b786c57444265322d4917fe0a902709 0x12546da79291172f5b02d3b0a4197cd92de63844 0xe42f369d602bb76fe338030341cbaa7460fc176b 0x1e46da6812e52de50b0b3d5bea68697673f84bbe 0x57ba382d262cd1d1ee1289f246c197049130df78

