ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-515C3E139F29
|
Infrastructure Scan
ADDRESS: 0xb2634d96381b65afbbfc2973fa088c40c894fffb
DEPLOYED: 2026-04-30 17:43:47
LAST_TX: 2026-05-01 12:30:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Requesting storage slots for offset 0x00… [FETCH] Reconstructing ABI from function selectors… [SCAN] Running static analysis on JUMP instructions… [MEM] Clearing temporary registers for deep-trace… [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Verifying ‘require’ statements integrity. [TRACE] Debug: 18ce0beb25e73aef. [VALID] No critical memory leaks during simulation. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xc3c6a6e47227e79941023f725672ce35b277530e 0xefd08136db5e38e9e171eea6b74ffeadd5b24562 0x0fe3fee27e22fba10abfdbf54a09a53a79fb4b86 0x73dd21a61cb4e43e84320d05508feef02743f39f 0x0def16671fd0fec2b1bab47a34c1a671d169effa 0xc207001aaada691f47b6f2fd46ded3c50e7bd294 0xa19cb692fe11a07440f282f188c251c331940e1e 0xba77d07f6c3d2b9e4058649c4e405722e5cffb79 0xeff1cebe330a5821f646af73249df2475b50dd36 0x927e66907c45820a38855a65e07ebbce218f4bcf 0x3f3f08a414d96ae6443a7b9094409b90b9029952 0x04feedf0a09177ca43d10c4f309149e5524d8294 0x9d010bbe8d0db4fa19e2aa4012e3cafb230964dd 0x99a71f719f189b2c2fd05901403f8baea28da034 0xd098cb2b26b90694302ea380d1c672deb1a81922 0xa3196f5c231d80cf7d2568bab9596ac384119fc2 0xcc50933ed1e2b9b02dfb2ccfa0ea78c0d4531af7 0x0eb46b16b9b1f91c61a4306b43cd31d9b4a1b048 0xd01ec38bec6df89562525538fd0a0f76ed493213 0xf6e8e70d5fa2b1bb7b9daae9c85f4b9bf991d443
