ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-4E65DBEBB455
|
Infrastructure Scan
ADDRESS: 0xc99813c23e93280d1b8c30bff0b3d05f06625a23
DEPLOYED: 2026-05-09 11:38:11
LAST_TX: 2026-05-09 12:43:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: E9BB99E9. [NET] Synchronizing with block height 25075. [FETCH] Hex dump completed. Entropy: 4.40 bit/byte. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Virtual memory mapped: 0x0000 -> 0x7ff9. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Balance check: 5.91 ETH. [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Generating cryptographic proof of scan… [DONE] Scan task E9BB99E9 finished in 74s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xa58769a5874999f749715e833c670a56c960db74 0x96f38441fa0bc452bc255b5949f29e07adf2115a 0xec4103cea51453697c3caf3c6ac9b818fe7b8ff3 0x8ea412708e99bd4ffa728388b53a0a5528607aa0 0x684a9cef2de8af626e1856a57e37e308322de78e 0x6e83e01fcfabac96f4963c0210250f0e54aaafed 0x99ff983dc037f1921105e52409b9c990202f8dc0 0xc396aae246b66c92a42ef08290a46546e35f436d 0x4d806bf62d9f7100af59f58e385c5fc6095d0c93 0x287d38ca1d89cd3c435a8279ac9a3528ddeb9131 0xc44536b9c4dfa736f3b3309a92bad8aff6d08608 0x15d6bdb7eaedbb682dfc372f07a42aac385c7936 0xe84f3749d54cdd563492ad76244a83aaae3b3b02 0x9dcf8b14b618381ccdfca266b930e5566745161e 0xad9cd214057f55f6eb5df3718b97e10e1abe0f1b 0xaf844995565e12bbdd2a0950b5269391700be8d1 0xc7e05da94eae5a92a26ee0ff84196335bfb2dff6 0xfb6d0ea6c68760877a8d0f6296bb7fcb6d5e7656 0x093556fa3246ee76f2c7922d9d6d238b3b157619 0x20e6c74e95cfd30b46db8e4c62db21b00bf8da55
