ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-69FB615BC7D0
|
Infrastructure Scan
ADDRESS: 0x12b94f2923395d0bd3dd3ece2b2671004f209a24
DEPLOYED: 2026-05-13 18:30:23
LAST_TX: 2026-05-13 19:26:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT
EXPOSURE: Debug_Mode_Persistence
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately!
|
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Warning: No source code verified on Etherscan. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Tracking pointer 0xd3391913 in memory heap. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Reverting transaction at PC: 6170… [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Comparing result with Triada-Security-Standard. [DONE] Log signature: 7089c2652e0d9eb9a1341bf0bd1df40de08791cc015214fbae6aea8dc3417f4b.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xe8da636ea99495317fa28e0a6cac960be65f1078 0xa7dea91bd30a4f724da257bb5329292d8fa43877 0xe14a422f878afaacf49b5062bd3b42a8440bce20 0x403401b6a9353858a67fd7debbff861bedfed89c 0x7d5b009233f98cb6eb64e88c724056f56c3082d0 0x54eb0e68031ccb5ca09e7541f1fe1ba742a47ed9 0x8ad9729137aa1d50d247c42ad2a82cbfa15f49eb 0xbad06f17f86a856000d5dbb80960ae46f0cb6f6f 0x4fd80a8867e0e55d5422cd611391b23033130325 0xf0e04b4fa6575e841fe3cccca75f8ef201cd2ebd 0xd9988c2eefcb6488321c5a59f47be6430b0f4acc 0x368bdaff4b35eae631af8364936bba8560cee39e 0x4b5994250f500ce28fc6e91ba6eea3350c8eefe7 0xc140f54f8e7129c928fe964b22eaeb5d3e1d93b5 0x5585e72fc4c216da8d59abb8fb64dfb7bbd75fe6 0x294ada9194544f5ffd9d720652363b739d5f3030 0xbbcdf6f6386e168db69e08e9e5f552ab92e3e257 0xc392fef8de619cee94fbbbab1c38650429e75b6d 0x5788be2623977c60309ec77eaefaee9afffaabc2 0xbf6c45dbe5775fca4dc92382b53eeda1162e2eba