ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-707AB3DE808E
|
Infrastructure Scan
ADDRESS: 0xd675dd1832bf14de9378182b117410eec742efb1
DEPLOYED: 2026-04-29 07:08:23
LAST_TX: 2026-04-30 08:59:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Requesting storage slots for offset 0x00… [FETCH] Entry point found at offset 0x8136. [SCAN] Analyzing visibility: 6 public, 3 private methods. [MEM] Tracking pointer 0x2f60eaad in memory heap. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Simulation completed. No state corruption detected. [TRACE] Call sequence: ab4a -> af0c -> 3f7f. [VALID] No critical memory leaks during simulation. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x1773713f65577172a2b1d2ec46ad92a0c9165073 0xa69bf86b785ccaca715657f741bd57383683fe65 0x14e261c0e1a09a6ad70ea233c34899507f090e53 0xab774602afb482b0f62b3c1713bcacdf4a09e9e0 0xa3fe08053349655b100b4aa51f4672c629c60dde 0xe374f1c39b090fa96c7e57fb401a91a269b65c89 0x4d03c1a3293a44e80de9b4c4134f2bcc0749d633 0x5388e19001e1d0b208bb57b64d7a40ff75588b39 0xd54767219a2ddb1e64e891a8032051283c299a06 0xe7aa9eba834278992390136e97d9f5d69a1c68ae 0xcbadeaa00ec3f9a23b5dd97912455f66f73be90f 0xadc9b703846abc02d350b40d923f9de06d2532fb 0x2a334500a24d5c701733f1313bdec68c688bc329 0x0b05e4a3f4a3788c75979beddd2127054121fee3 0x0aeca53f8ff3687ab395815e8c867e34389db259 0xd81f324108088850c71441ab208701b4ffaad13c 0x0cc8f5870c489662ea787f253f28c5e61bcee13b 0x0d7d3c86fbb6fa61c953a5f971c992f96a7a137c 0x1bf3552fb5192ec08d1991a43cb8b292d4fd5121 0xabd00c854d377a60d5e7efd3299a60b02c4331c5
