ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-8826A514C056
|
Infrastructure Scan
ADDRESS: 0x3a801607823ab7606937eea439dfb32024509a39
DEPLOYED: 2026-05-14 00:09:11
LAST_TX: 2026-05-14 00:45:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Mapping peer nodes for transaction trace… [FETCH] Entry point found at offset 0xcb31. [SCAN] Mapping ownership-protected functions… [MEM] Initializing storage slot tracker… [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Mocking MSG.SENDER as 0x7c8cd5ce048d9336f77e4c76f95087183984b06d. [TRACE] Execution path: 66% coverage. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xb4e6dc27195a625bab4a9283041f1ee7ee6cfac8 0xe4cc76e0d993d2be2ceaf581cd78af8e9c6c8740 0x33e30070f05a2bded10b222921e6c21d7295ae22 0x8abf308f591d7c5c2941e79344caa10fb31752ea 0xbae9881dbc129dc54e52b6e47c1f2f5cde358ffd 0xd0300956ebfda7511852ab178605f774d91e0a73 0xfe0dbc408659c43ed42b6770a6f5c72cc4472889 0x9dbda847caf12888a827027a50a6ad8903c443e9 0xdf2a91285ab6ab2a7209bbec215db35dd1e4205a 0xfb2ee8c406445874af2e8404d912fe21449bd80c 0x6f1d51928767309609e9883b7c75db95b1ddba96 0x1cea9f81988309a0c41f7471871805d80b006187 0xe1ab980569324396a4105524a62d7c5d15a52bdb 0x76acde8023e85b50953d9c3eb455eba87929807f 0xc90be997d2384d281d7f63bda3a92b2a1eee6bcb 0x39d38ad5209807e3cf7bc121e7c2635c154aa70f 0x7c5992f48efb6b8bf58c7cb608c47c330cff00f5 0x945fd2252bf29ad53c88ce926335bd04de4cbaf7 0x24d2e7a55bac748deca5bdb3334372967a22e1a8 0x1f12dfd273c433c8e686e330b3aabed452472542