ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-1AEE0B0C721A
|
Infrastructure Scan
ADDRESS: 0x2094ce4f820fbfbef1ecfff2293279687dc30118
DEPLOYED: 2026-05-06 02:32:23
LAST_TX: 2026-05-06 03:10:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Connection established. Peer count: 17. [FETCH] Entry point found at offset 0xedd3. [SCAN] Detecting compiler version: v0.8.81. [MEM] Virtual memory mapped: 0x0000 -> 0x55bf. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Fuzzing input data for 12 iterations. [TRACE] Call sequence: c4e2 -> 7acf -> a2e5. [VALID] Generating cryptographic proof of scan… [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xaa70a0521fc0ec61e9045914464f27e0eee97a58 0xee1b246bdf9b791847bfa1c5ed6b6013280cdd92 0x1ddef7fbc04d377dba7d43518eaf6cc6f50b4bf5 0x9510b6633ad9e294ef19197a6b074cbd9b4945cc 0xbc4a206afa29a567027a992806694ae011e66145 0xb975bf966eadff484be385bacd90619e25a73a41 0xfa158abc1e57d4f28124bd69253b5046603f3f98 0x29ba9b89d247df719199e19ac5e07d915592b185 0x4ab2217002be0170e3e0a5edd582385e29ef4b95 0xfd85497bd92e28e066411b5d05cc8a5e03a44211 0xa1436366720025e5104f80fd6a456c7aabb45911 0x1a09552187e539c052e8fcde3e24c7d9e895fec0 0xc1b6e5e90394cdf21f1d79539690f83c3dadc20e 0x627350eeb3d33ad48cd6f5f0a0e0001d9359652b 0x4009fc878c9eaeeae2b297a33614f93cfd0e1526 0x049dca3631490a01dc87be81e816ab0a456c84bf 0xe719a0c64b517616cafe17a5dd33cd867907492b 0x6ef160348f2bcee9502dc33616f4625c6e340759 0x085558bd42ff2c8e2084c29f68801124a665388b 0xa88ec3871f55d609baa11f9cdeb983ceac0435f9