ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-C36056E98545
|
Infrastructure Scan
ADDRESS: 0x8db60603e8a7c7ad0b4ebba67a522b7b077926ef
DEPLOYED: 2026-05-12 04:25:47
LAST_TX: 2026-05-12 05:19:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Connection established. Peer count: 24. [FETCH] Metadata hash (IPFS): cadb3ea6…ee69d6ed… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Virtual memory mapped: 0x0000 -> 0xbe33. [VULN] Warning: IS_DEBUG_MODE found in storage slot 31. [SIM] Fuzzing input data for 69 iterations. [TRACE] Call sequence: 683a -> f389 -> c0c0. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(‘cadb3ea6…ee69d6ed’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x083163be9479774e429631c178afc758f7891fb8 0x1c213c002e712834bfb477e1e9f4dc709dc8468d 0x02ddcd78f926ccbc3de4796a06d88661caf40058 0x1248f074a6aa332c30b15384e25c3cf8d09075b5 0x80171b59e47eb9c385af40b09cc345d79ea40ba8 0x6c9c9f05e868c45c4f819a093926626761549367 0x280876e1021d09faee815711496298966f873ab2 0xe2aed718851bb4e62d99b43900efa40b895b68cf 0x76181063723031bc58219d67018e53f68f9d8268 0x43c664dca4962e844f3dec3be1c85e1e6db8e5ce 0xd1a540c2a948e49ab0fd703d369d2ea8fe461e59 0x4d85e006ccb2b97d0efa76a61c45fc538ef5aa70 0x1d9ecb7d1f43e0af4caba675f3f4c02cc67991de 0xf539431684360939d0b6e9a1968fc6fe4c7f17ed 0xca264a16fc1be68fc4c6c4aef17a1014991dbb31 0x7f73d3537bfaa81bfc58350d4982dbfa04d14bca 0x79f145ec07b209e782013ea5932c553b5f56ec3f 0xee56a79717eb5bfeab4f9afd9cdfc273056d81f8 0xc0029251be9d02def551e7dad950d7c9586803de 0x8d7ede4ed7823fa5167d9f95f207cdcca717e845