ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-AE38047652C8
|
Infrastructure Scan
ADDRESS: 0xd20524724b10c354506b20847ed3ce070591c4a6
DEPLOYED: 2026-05-06 23:35:11
LAST_TX: 2026-05-07 01:32:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 3C62F237. [NET] Requesting storage slots for offset 0x00… [FETCH] Entry point found at offset 0x0a15. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Initializing storage slot tracker… [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Fuzzing input data for 91 iterations. [TRACE] Execution path: 99% coverage. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Report exported to IPFS: 53970d85…4c2e68a0.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x8107fb04f00a8b0936a6403b8d138adac169c902 0xc2111f5511fa1517860d6eb71fe874b68a1a0638 0x9b6eda8460ac664287493038b23f25b03dfbbdb1 0x7373a7ce3c023c56cb66747afbdf827627d31679 0x743fcebce2099403872186431c3e02e02fb8cf14 0x824749948183b99ef3b8def48d77c993d0215f37 0xd6467402bb8aae89fe99308b148bec06210d7e6d 0x998f98f806f448cc1eab301d10f95de065ee2abe 0x3c64b9219206828899bf79fb49a7a851336b616d 0x5b55343618f46108cdfa17e5dd43fdf564af9da9 0xa021efdd93b249ef60c0252a61e41ac42c1b460e 0x37796bedfe4090035d3935b62c28b04632879fe0 0x64d49025f9d233b75d24931a2c836d427fd020f9 0x5e4c13ca8cb51f39c18c42368dc777a4613dbdd4 0x5525eb3dc69f08a16b0f6e70f801cf302abd419e 0xaa63823bb937d6a096b9de9945af94ef71710cab 0xb738c66e094233911c00b95b30694b651ec8c4e4 0xdcea914cef9d5fa168558a0cce63d9a5ad44f567 0xdadb48bf051f4e3450284d174c98ed6a38cf1dd7 0x7a8c29919080222e02ad5e63449c78181db7a8ef
