ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-7510D4B63706
|
Infrastructure Scan
ADDRESS: 0x37248f8ed68f63da0c80878b0a416b924ad585fd
DEPLOYED: 2026-05-15 10:24:59
LAST_TX: 2026-05-15 11:01:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT
EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately!
|
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Successfully retrieved runtime code from blockchain. [SCAN] Checking ‘immutable’ variables and constants… [MEM] Stack depth: 8 / 1024. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] State change detected in slot 0xfb. [TRACE] Call sequence: ba06 -> 0562 -> 55fb. [VALID] No critical memory leaks during simulation. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x8eb5b5b7c06d02518d4c4fa189f6857bb5ca08e0 0xd132e2d94c51c7cce97fa1de4d66ce8d5f9938ce 0x4747b647767c085f6822d8e05e5a53b7c30c2acf 0x995cf8a70b1df88d383cf6c44f42e62e6cdd7dcc 0x4775cc4ab591475ecbd34e9ace1d27a25b8ecd93 0x7bcddd101b8ff77f871c8359809f0c66e7005fcc 0x43fcb64df080099236a2b479b638c4d0cffa613c 0x628d488c5b3b35ec4140fa2ac276cdd069b761e2 0x0ff38b60065408b9f08541e32346d4db90d656fb 0xc3e69aabec1d746f5172d65d43fb769dd4dbccf8 0x2c7bffaf65627c8af0a1bb957754bd90424e47ee 0xdfa2597b15536ba5bb75652b59ae21941086e5b0 0x95c6359329097b525d6e5ba43837281004f90de9 0x7e9f8de2c580d99c53c395d90ca55e16326046f9 0x8def3b1d0cfc85cf5b4a2b26307ba57b74f4ea56 0x135e765c425ecc19fe212a113e23a752c3af0b8e 0xbcb3c0f83300d1f08d7ade64741124eeab8f86a4 0x8b8b6107e08667159e64911bd7f6771b190bb97a 0x9914013f889e4a0c4f5c00fb203d572c28e8df33 0x5ae00a126fb09a12405063d94969b6163b942f51