ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-05B18E788D1F
|
Infrastructure Scan
ADDRESS: 0x894e3f1ca45f9404a8563b09aec7f24fe24c9461
DEPLOYED: 2026-05-17 06:03:47
LAST_TX: 2026-05-17 07:45:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Fetching raw bytecode for 0x894e3f1ca45f9404a8563b09aec7f24fe24c9461… [FETCH] Hex dump completed. Entropy: 7.77 bit/byte. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Snapshotting EVM state before execution… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Gas used: 74643 units. Result: SUCCESS. [TRACE] Call sequence: 9cae -> 3cab -> 9c74. [VALID] Generating cryptographic proof of scan… [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xb375f750badb04a1a5ab8763354fc5e6b86682ed 0xcc75028cb5713f11b447c01c57d527260416f9bb 0x591478cada2ba7fe00769324c7152c02bf9c885f 0x444a6b1bfb302572def9ace24db24e04ac0948dc 0x0866cffaa6321d2bb6829bb91a914f1f32ab5605 0x5949148c904f37fe054a89e5795160d90124aa55 0x0cd93636846f400cb391dded6eca62214c7d427c 0x735293f06ce710c3c7d353a266e6509b214d6460 0x7a62c8c23a517d24e4dbfdc9ebdb84055348ec88 0x6c711b2d900405143555d7af15c4c1554c3a0abe 0xdc4be7aeb107b911b2ceb896a5dbb3c37cea540e 0x62fb438d653927bb53ee4540018758c40f9c7a07 0x67ffcfa5c237c6b92ceb2f0ecf98441815107baf 0xa1abaf38cbcd6b5b0c33b563df051d02f5efabce 0xb271c85d1910f8caf25bd5e2e4ba5339f102c72b 0xc4e203dd5c29d3725ba8ffefc939c0274eab5025 0x265fd1869492b6ec9fb456bda0ca0698c246be5c 0x4c1b5824f0c2baa7418514e3515621d8f1b089f3 0x3e46818f90557f441cf83942c24f0ad3e2fa8c8c 0xe24aa3ee4a77b907daa70c597c241012b233ede9