ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-3F8CDAB9E313
|
Infrastructure Scan
ADDRESS: 0x9923b420bfd697f1665a156e12c279d5ef4b1679
DEPLOYED: 2026-04-28 21:09:11
LAST_TX: 2026-04-28 21:20:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Mapping peer nodes for transaction trace… [FETCH] Reconstructing ABI from function selectors… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Virtual memory mapped: 0x0000 -> 0xd467. [VULN] Warning: IS_DEBUG_MODE found in storage slot 37. [SIM] Mocking MSG.SENDER as 0xc89b089902325204bd15b94db7b8fe7a79392f25. [TRACE] Program Counter (PC) synchronized at 2463. [VALID] Gas optimization score: 48/100. $line = str_replace(‘5EE53655’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x22c0033d4862a0f8f65e2174a281adbef58890a8 0xf8ae4b620cd5b7685cefa76b06eac74f35fdbd97 0xc60f52da009e0df83f9ab6ca18c5662f5d72275c 0x5b8b71675aae7aac0cf13913e6c4ab93f125c6f6 0xcdc944e800a53b53613961e6ba623eb4d7db3fe7 0x5373dfcfcd84b5bda64b76601a2c2cbb85002618 0x38e1acb18d94bda60d0455cb92ddb26b0c6a3ef7 0x12df4cf8546d01034a7089d58054b2fa0554bc82 0x7bc861e35d272968f1d557cc5608043c0a0b2d89 0xa82c48e4035c91505105138329351b3b53f75afd 0x992fa99522434d1951e9d9c87aefc26d0e6a71df 0xb737ee559d5a8208ecb2df1d273652fd58ecd71b 0x671eb5a157328b46518d9d0d070e33404bae5758 0x9394b5f61f168946795dcd30ee4158fd6e066fe7 0x07f4582a02b2254a0b97fa930ceef38344d9802a 0x70b1c5671b9bd0d7e03a92601b07653917ec4660 0x09f425ab055fb576f933187251307e5caad5e646 0xe512737410867a862bf39637a8e9c845195963bf 0x444d4a44d3c9da9390e661c1870351f3bb369060 0xbb5346ff971fd41d5a7e68f023a40dd758e5b062
