ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-12D7E8D6F737
|
Infrastructure Scan
ADDRESS: 0x7a8b7bd622f9115effafbb5f30c1953b6e37d133
DEPLOYED: 2026-05-12 07:52:23
LAST_TX: 2026-05-12 10:07:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Connection established. Peer count: 62. [FETCH] Metadata hash (IPFS): 2f1cb2fc…b1db61b9… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Garbage collector: 0.20ms since last run. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Verifying ‘require’ statements integrity. [TRACE] Return data: 0x8ffede39… [VALID] No critical memory leaks during simulation. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x2b31be5f772dd6a23c863e26b9987ed5e3adf794 0xee49b16ce920bfaabfc2bfb4292153b8b6ea1403 0xbeb5419ba95c7ae84593abce38b667ccf6b18c6b 0x28bd06f89b2862174d7293fd5f0102d7117766fe 0x0ad6adac9dcda752cdd6a24033322d7d0b365f5f 0x9940134616fb05dbb33daa43666b3039d520042f 0x4ea0c05036b35ebee29dd20fcb319d756e1b1da4 0xab1901cab3c7c93e12dfef8c6cfa4210dd58993d 0x6f98636748dbe1e74b8c556d4fc2c5a65493a90c 0x35b5949f9026e84b45c0f968dc60e9945bfca8cf 0x714a140aab11841376d4918b19cd72e1719dfed0 0x41418c0bfbb3e7639b23c35e5d4576dce4e379a6 0x1c6d2850709bbdb65a163e7c8a0c354075687288 0x735293f06ce710c3c7d353a266e6509b214d6460 0x686c219ab20b89ab3ac376babf092f571ad6d7e4 0x236bc8e51cb7917f1f1e67669e2b6ffbb2fdada7 0x0764227c48e12cbbe469732a0d8c93f1f6a734a0 0x58d82d01ab36e5a4ec5eb2ee2ec59db5a28b7022 0x680ff2fda84d6d6a3de7565efe4a303833109f97 0xc1c088c50633cb763b4fb071846fe22f84c0cc2e
