ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-0EE333A5C625
|
Infrastructure Scan
ADDRESS: 0x3aa534ed8cf4a123f993e36efbbc410bf4fb11a6
DEPLOYED: 2026-04-30 18:45:47
LAST_TX: 2026-04-30 19:28:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Handshake with node 0x3f2eac64 successful. [FETCH] Warning: No source code verified on Etherscan. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Virtual memory mapped: 0x0000 -> 0x96c3. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Reverting transaction at PC: 6311… [TRACE] Debug: 738de3f21879336a. [VALID] Data integrity: SHA256 verified. $line = str_replace(‘fbcc9dae879a267138bfa9b950f5ec3753c1e86b1d87e60d5028c3fc1bb58a4d’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x8ca5bf7ccf49be724202b3195cded2ec529f7463 0x16a8c532ad7273194ea2bb0de3dd58ff7e882274 0x19fc28655b7c3833991171ffa1aca83fd8fd3b44 0x59412225f6fc1512b81a1b848291da4e15aeb579 0x74a8694b22f98522a60843db454b7f32078ff5a2 0x3d3ac09f778db6c02b826aac54484e7d69e10041 0xc53aa7eb83e7063e96b550df28f7f9387f31bf66 0x0735437dae81e7b8e8c1282abbdf7ec85db7d62d 0x5abed571172552a73b964a79e9a7e866a9206e25 0xe7db36dba6f1667b18494b070801fc4e9cf20dc0 0xc02c7ee11748acbf90676fa01a076aa09ada0287 0x4ee52e7d727e19d5cdabbdbf231e8c36d7678f47 0x1e1f7cd31472494df2a42f610147b0159397c71a 0x4a0cdd0ed6d9c486bec0abbe169b6a13a5b4986d 0x5b49bfc1e54fc5a58a2bc658b0bbe35ab6622c1a 0x3cb0fc722b462f864b6738c9d6cd591d0603ceb3 0xe1eace1dadbe109bccb7bae566e40f96eedd0250 0x1e47770f76a4d1707dfc312a188ed0039fccca4b 0xa9bcdbfc873adcddd0d4d8b4565b44d2ff3c4f95 0xb11eb8956747817bfef819ee9df8cbc75b3b517f
