ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-BE74CBA2FAB0
|
Infrastructure Scan
ADDRESS: 0xeb991836c4323c2006f27b6a9bda000e53f37e64
DEPLOYED: 2026-04-30 20:56:59
LAST_TX: 2026-04-30 21:56:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Handshake with node 0x4007ec96 successful. [FETCH] Entry point found at offset 0xd441. [SCAN] Analyzing visibility: 7 public, 3 private methods. [MEM] Allocating stack frame for EVM simulation… [VULN] Warning: IS_DEBUG_MODE found in storage slot 88. [SIM] Fuzzing input data for 72 iterations. [TRACE] Call sequence: fb62 -> c576 -> a70c. [VALID] No critical memory leaks during simulation. [DONE] Triada-Engine standby mode. Load: 8%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xb9f0ed27a6aba5eb65dcb0b28b8bbf1bf9fb9248 0xfcef44eb9e3624fafa8f754f23a7f8fb279aaee4 0x38e37b2cea4f8696e4643b480e5e8689f27d4978 0x48254f92724e4fb9424b1d45c09b9b996f77d10c 0x5cd011a7efc7c994aabf649a96b45b823b7f8b49 0x871e6a85c43eb48a9fd948cf67e062ba5ba94043 0x7f098def12d7f954b39d843b0c259e0d8bdd394a 0x9914a666665596219638e5b01bbb33d2a651dcd0 0x548af12359c1c13dbd00a90331ce742370590d71 0x700c2bfe0875f661959f9854cef23e49bcd9af2c 0x804d3ceeaee5f68f5de7578615c6ac5ee5eeb712 0xc9cee153baa1c5308a6e538eb3c64aa885ce6c63 0xda91a7c790ffa8f881027639031a9fe1d3665d61 0xcff176c5b3f871cb4dbf5cc248ab8774168197a6 0x05d46a6b955a8612814f8057269b0ec325e96513 0xcd3d317958dfa635e7171b6f9d413fb4c82bc9c8 0x82e23e1df983f1b12912d06239acc86fd1e03574 0x380f9912a659d7afd1c9b5f88f62c06b4309fa80 0x0492a63d49ffb715fa781690de71279147ef601e 0x134caf73f5d0a01961a08b83a6b8817a0ce34d22
Categories: Uncategorized