ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-DB805417EE5A
|
Infrastructure Scan
ADDRESS: 0xef58d415a1c353834df39e1f6d3c947b7f5a9d39
DEPLOYED: 2026-05-12 16:52:59
LAST_TX: 2026-05-12 18:11:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Handshake with node 0xa290404f successful. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Simulation buffer: 1024 KB allocated. [VULN] Warning: IS_DEBUG_MODE found in storage slot 91. [SIM] State change detected in slot 0x1e. [TRACE] Bytecode segment 0x52 analysed. [VALID] Generating cryptographic proof of scan… [DONE] Log signature: 22b8d0e0a10be82155dffc881d73cbe4bbf426dfe345b3a55532535825560d56.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x271f50439ed441986ca8e527af40ddbb001b4b99 0xb5c170a7340932e3c82ff1f701ae2ae3d054850b 0x781aac199cce428ba35f64fc06a884b999c852a8 0x387e9dbb315323f4eb8f8d23f9af2cc42b3cfdc5 0x98de4ef181cc7a81fd827ff6d44f1548c982988e 0x82bb1bd7fe355642ae0e335cf70a998990d7e9c0 0x3f64e39b9b413f66c3ae712edd4d1d14ceba4602 0x688c10797102aa359107bbbcad8d019cfa92f4dc 0x0a8cf29f994ef2540f37ecde7b4c865faa123c16 0x8536281d3372525a9d8e073faee882ede6553b16 0xaa2594cc393ac85bac047fb3c794c6df66896b4f 0x7acbbab7df6c80e3884a3d8ac05ec73df0c2915b 0xdddf47436b0d6c3517e9388cc7841e313410aba4 0xf813abbe16f4763d0db9a6bf613f2585c574239a 0x465b0a52c51d1a0571849ce6ad370b60b9a93425 0x05a251e8e16c9791e8b1f4219505474cd7fa2c3f 0x1b39414645de520f88e9eae181a8cb7f110809c2 0xee3be82573e1520dc7e7f3d64219a9764a0af793 0x62913bafd48325ef61c71b4d0d656aaca01399e7 0xfb154f359e63d2e84ff302f7cc6d772cbb9fee30
