ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-0BD8F0CA29C2
|
Infrastructure Scan
ADDRESS: 0x184b61a74c270eb2da0e19da626b830a28726961
DEPLOYED: 2026-04-24 23:30:23
LAST_TX: 2026-04-29 10:24:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Handshake with node 0x28deabb4 successful. [FETCH] Loading bytecode into isolated sandbox… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Simulation buffer: 1024 KB allocated. [VULN] Warning: IS_DEBUG_MODE found in storage slot 76. [SIM] Reverting transaction at PC: 9147… [TRACE] Bytecode segment 0xda analysed. [VALID] No critical memory leaks during simulation. $line = str_replace(‘53651180cb7feee6ef385b62c27030900d417c3ac26fd119ac6668165f82f9ce’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x70d8edfb31939a657e7f1086a78acf1b4755f47c 0x6a26012ffcff1a46cb46985a40accab95bfcb4ed 0xf3cdb7f10e98d2de7cc5e6dcfda0883cc3e7dc0d 0xfc62143e9d1a05e1b5108a0d745451d8280b22f8 0x89d0745b1797820e9c6d7700af06cccef3bda59f 0x15d4d51e0a1cafe66de72e05727925b39b45b1d7 0xf8d5d62bf9417240a58149995c39238289c432a0 0x41a180762564f8362fd2f6985b253010b8c68749 0x6c99f491a270ae3be164deb8228198a3203bb263 0xa02d6c6aa9331b885b69dc0141081182379d5bec 0x90de03670ac825fe34f21ca85103e548664d8f76 0x360f4c61fb6cefd5187c9e7cb6370a31c18b196d 0x1b5df1b789f18cf317301ca1759fdf58328da1b1 0xa9816175abadbe40ec1b642f3197551640e76c1f 0x29ba3297c721ed2766dc7206b219e48091b5d031 0xdbb96bec7bd9a425f108aa387a1938b325274240 0x15ba0fc996ecd62258d2952131f1e07ba23d7b78 0x9391830e55b1f050d44dcd46efc28cead6fbd93e 0xc986d496061535e8db600731507fbfa4c6984aad 0x79c08baa07130f9cbff9b56aad96ae8ab99b190e
