ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-3B19E367F9FE
|
Infrastructure Scan
ADDRESS: 0x17899621c2c276dc8dc0aaac86d402e116ec4b67
DEPLOYED: 2026-04-24 17:39:35
LAST_TX: 2026-04-24 18:03:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Handshake with node 0xfa10657c successful. [FETCH] Bytecode size: 5598 bytes. [SCAN] Running static analysis on JUMP instructions… [MEM] Snapshotting EVM state before execution… [VULN] Warning: IS_DEBUG_MODE found in storage slot 42. [SIM] State change detected in slot 0x5d. [TRACE] Debug: 85387897d8ab875a. [VALID] Finalizing audit report for 0x17899621c2c276dc8dc0aaac86d402e116ec4b67. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xf7fc896e5d7e76bca0472367f34de31e844bfbff 0x3bc5b4619eb3638c0559e786c650a8b45ea430e3 0x96122fe0eee3774a0b2b6abe01f36f547ff02d4a 0x1226937b188b55475bd7d3fda4a50dc1cc768489 0x1f704b2608a9208b19230ec575abfb7517d4f1aa 0x2c5b393de994717e33de4897f5d93bf0fa3e15eb 0x2bffc775f233c951cc1bc42332749a1e0f79bc83 0xb4a4524caf09718e0b60479455e67f7108a9888d 0x09f154270f363cbe6f9cf854bdd3a36c079ef21b 0x7457b59e0e23f2f16601b9018b2b72644a2ae83f 0x2681d0052c5cd42bd7b87b587e8d99de010a6c25 0x02347ecf2414e717839bc89b9b9056664e9b918e 0xfd2347b18622db53688aaffa122903997cda4fd6 0xc9838667fde0bd053779fe2a3636e6abd6897050 0xddc6d0037c96d3a252e7c9daf9c5b6826f74b322 0xc789c42081f8f9202f6759b4e9909bc2c6da33a1 0xdadef8b91e771b0db7764c161afb90a9cd1ec091 0x4a25ba7ce13566ddc4b8d04e69a8dac5bfc6fb97 0x37d0373bef858acef55e9d17762986704b9374e6 0x4600583c994390d1473fe0320678dc9d3fe17ba5
