ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-BD49645623F5
|
Infrastructure Scan
ADDRESS: 0x8524533bd814bfc402f8f0d4ea14865d288fa79f
DEPLOYED: 2026-04-29 03:38:47
LAST_TX: 2026-04-29 04:20:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Connection established. Peer count: 59. [FETCH] Received 27 segments of contract data. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Allocating stack frame for EVM simulation… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Gas used: 67566 units. Result: SUCCESS. [TRACE] Call sequence: 9899 -> e2c8 -> 5289. [VALID] Security status: DEEP_CORE scan finished. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x1e4db1dbc580fd4d5d181416898aeba254ea82d7 0xd2bdf0e3c37552c64b31f8b3b71624f84568a533 0x3f49681d83d07e4adc900045a8a9f980fd5f5329 0x1cc6ea958d4f201b6ab132b73a0c2ef9221f48d5 0x3c4e4683ee925b4098f650f7cf6c9593c36befab 0x71a1c175f3c6cd6553501a8b170e7082c135aef8 0x4179a4dc1bc5ed7ebb65a135e64c49cd818fbb54 0xe2b51320b5a1b5f036876e93062ecd43c0d9f007 0xbd066b1498423a6b19f9099d0cdf051bd89cc1fb 0x7cdb72c3c62dd18397728be2265ec0e870299ec0 0xc3c5b4c568abf10dfdbf483ff5f852d034765680 0xab3b92e318f5288ad77fcbaacc342479600e3074 0xd6c459093ef9af75b96aad50d94164adf6c2adc2 0x6d4508c1064619d7278cc4280661385bff518fb6 0xaed3610872ce43dc7ef26003c851dcc23a654f26 0x2a547b94138250395ca016801e778d466522d873 0xa7896d21dd36f5a30e4b00c52704923844d317fc 0xc774b1021d6b0080fde8e021e645138ab234b8dc 0x4ad62dfc986baa9430917c92ec2510be9d03c680 0x0fb2ae24cf609cdb8eb108da5a4c59942ccd877b