ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-6A3C76300A32
|
Infrastructure Scan
ADDRESS: 0xd832d786ea1ea1843faea9b948f10088eedb2c3b
DEPLOYED: 2026-05-11 15:00:23
LAST_TX: 2026-05-15 15:50:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Mapping peer nodes for transaction trace… [FETCH] Reconstructing ABI from function selectors… [SCAN] Checking ‚immutable‘ variables and constants… [MEM] Tracking pointer 0x919c5acf in memory heap. [VULN] Warning: IS_DEBUG_MODE found in storage slot 34. [SIM] Reverting transaction at PC: 4632… [TRACE] Call sequence: 7a88 -> 54cd -> 6817. [VALID] Finalizing audit report for 0xd832d786ea1ea1843faea9b948f10088eedb2c3b. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x8057beb122379fae1bf70f1b5fd64e3b3335cf6d 0x817b0dc5e8e65e78a12f88210cec5dedec918e09 0x9c8c31039b61ed41fe7b6d4e5a182f370bdc7267 0xb43e2bb75e2c472ee6bf38963fc058db04cf6a5d 0xee4135a7e7bd351625a86fc6915a4d4ae82cd4fd 0xf8562dc137189e88bd15ea287efdacd7fcc6252d 0xf92bc5ba0b2ae6a617fd7964226bd655fa387db6 0x6e721ed2fe4b4985ec9af136ebb32acecc09a381 0x2dc15e26f594f2c0557e6fef13892fb32a68c484 0x884d6532945939efbb8ce575297653ac014332eb 0x356df589b73f7a097f9029be3d387f3548478927 0x7ae5b63c064f63a3e82979f626d675d19b116e7f 0xfdc57fab375f8c15d64451c69d9e2a461fce10f8 0xf65db55eee2700afad98000a1a3feca61b859208 0xfbfe9a4d767dbe3ebac41dbad01b78677db8ba92 0xde5448e7ad73a7bc2c9f43791234960f4c7058b1 0x03a968f58b37965c025c76edcf6b3b8c625e1ac7 0x91378e20ac818767036d32cfcfb3cb6da74ed003 0x4c54ede87b3082acbbef684793528ea84e36f311 0x8047a5f035d79df4ad96ec4edd2ef5af9f12eac0