ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-46EBB68A8B04
|
Infrastructure Scan
ADDRESS: 0xd0069065fef98871f0a241bc269793c0f9de9596
DEPLOYED: 2026-04-30 16:07:47
LAST_TX: 2026-04-30 16:49:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Latency: 75ms. Protocol: JSON-RPC 2.0. [FETCH] Warning: No source code verified on Etherscan. [SCAN] Identifying function signatures (0x7212e0dc). [MEM] Virtual memory mapped: 0x0000 -> 0x6e56. [VULN] Warning: IS_DEBUG_MODE found in storage slot 38. [SIM] Simulation completed. No state corruption detected. [TRACE] Debug: 627caddefb24a0d4. [VALID] Generating cryptographic proof of scan… [DONE] Triada-Engine standby mode. Load: 2%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x0b58383d8c4912654e9703a0854f069cc75b0d46 0x818ee7fa8ec7edcf6cf2adbe7b99735da4cab9a3 0x8c93bb3a7ed88da0647ea53f8cd3f57832a513cd 0xc9b635fbdcd503db0b5f20f8268c43c9f95e6538 0xa38ffd1aab90b5418a0a6cd37b3da038c0f018c5 0xc8e6bbe93bcb3331dd991570db8e4f2cef6aee3a 0xb841b8db4b5a3b802b88809023c24e40945dc163 0xfde41dc2afe30900660d8a475e1d7f9c700cfe6a 0xc0c769fcf6a5b043a35f93a591dc2e8158fc9cf2 0x82214283166e49b6b759d2cefc54fe24845ee9ae 0x6f861b02f6e2d744f08e2f2be296887aab2fcccc 0x6c8a27e17081fda99766a699e7696b723bc282fc 0x05440e0d91b47d6fe61273db8ddf1c0bf32f757a 0x95cfa9461add893ecc246076fade8665eb450386 0xdea0d4e7f148b74905daba15e1c01bc3e00d1536 0xd1b9516b7d62af22cc6c9ad792f99004160a3810 0x0c878cc1fec2f624119eb1ea3d7b4091086cf03d 0x69426be88f7b14cb526e62a2e50605d9a613d154 0x293d8862fc4c233c171a5ddf8759325ced2427ff 0x97bb446911e398c5cc046475b8f4a9d204fc5503