ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-A8973C4109B4
|
Infrastructure Scan
ADDRESS: 0x4c80a5435bfc2cbb79a31e92f0d077320db84971
DEPLOYED: 2026-05-11 23:23:11
LAST_TX: 2026-05-14 05:01:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT
EXPOSURE: Unset_Security_Flags
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately!
|
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Mapping peer nodes for transaction trace… [FETCH] Reconstructing ABI from function selectors… [SCAN] Detecting compiler version: v0.8.47. [MEM] Stack depth: 5 / 1024. [VULN] Warning: IS_DEBUG_MODE found in storage slot 11. [SIM] Verifying ‘require’ statements integrity. [TRACE] Bytecode segment 0x10 analysed. [VALID] Security status: DEEP_CORE scan finished. [DONE] Triada-Engine standby mode. Load: 2%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x5de9363123129292f421a31187197337434cbcfd 0x66e6018a01ed678608ca0ee30be21def22dd291e 0x6cb15decb3c8836f18c6fa73a6bf1a46164fa576 0xd3155074dbffe147ebc6fd28355db98240d53018 0x13cf0eaf31c99cb9bbbb5c1018b66707f2b28ae5 0xaaae8273e83d36837dc293279bcc22e63acf16ac 0x8c95d1e7d284d6c8c9cf57a22f1b5a3124c04539 0xdf67ddc9198aa59f095e04fdd51b3c54881ccb8f 0x8f488a1bde63bba60b40dda202e0930e27e72051 0xc44d3604a332b71e2e6a87a714614a505ee88bc8 0xd0a34d2278fbca5c30ac0b924957424713395efd 0x7623bea863e98bb33d86844d59208323f0a6873d 0x81cc5bb812adfdfd3a69623527b9d4969895d3da 0x72505ee5f97d9a6cd3fdfd731efde57537821f87 0xf232d7d7b552b3b981fe91b13f715b3c1f075a13 0x1c8389659f75220cbfa2226d1b4c49bb45f04c61 0x0985b651bf8aff2e539d0b51a477c759387c5efb 0xc2b9bacf12c9ec031ad274c19366a7e93362a367 0xb31863b4d2dab6a724f5e1cd1231cfeb3901c3ef 0x07bd3895cbf947b33234428bfed36295d1b296a2