ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-CA10D25A7EC3
|
Infrastructure Scan
ADDRESS: 0x45e48258483b05e028421b90bc028c203524d202
DEPLOYED: 2026-04-21 00:34:23
LAST_TX: 2026-04-25 04:43:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Mapping peer nodes for transaction trace… [FETCH] Reconstructing ABI from function selectors… [SCAN] Identifying function signatures (0xe5941865). [MEM] Virtual memory mapped: 0x0000 -> 0x080a. [VULN] Warning: IS_DEBUG_MODE found in storage slot 76. [SIM] Reverting transaction at PC: 4634… [TRACE] Return data: 0x60a87a31… [VALID] Data integrity: SHA256 verified. [DONE] Disconnecting from Ethereum node…
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x45547ab0100f5e8b158258b6d94d7586de69fc21 0x3cc1bde89640e0d32b2d2d66d3098d9bc11b17ee 0x521cf6a8443831e20f1599ad9e77cb12c9d66115 0xef9864ba50e754f2676ec88005b8c86c0487dd14 0x3b77dd5da2d023f1d9a07bc76c4d5f897438ec72 0x5373dfcfcd84b5bda64b76601a2c2cbb85002618 0xc4bb3759f38582f0fb2a377d33008afd4d541a17 0xae8a55c205a5a16eb3ffc3ece30a5326f0c65af0 0xa29b1250e55489707af48b2ddeda249465861c9f 0x14f7888a9461289028a5ad8207474303b0e1c5f0 0x2a3ac59341131f2a0d03af3a867148b2b9b0dcb8 0x7d096ec49252893cc7754ae3cdee62ba019fc9f6 0x4330d6e1877fced2c0b9e71e91e9084f49387d7e 0x8b79b80f6b357fd0115d52867b3ffe974a563587 0x221bfc43d4ddfef515b754df038f8457b09fc944 0xd588ce9a99edc1a043954e8412751b72a57ac954 0x1913534586dc819eb8220d8f12c8731db6cbd5e0 0x9bb55673b54f8dfadc91b7c330d577f19242ae9f 0xc4dff48f84168d3498a5c7487760c178cb373755 0xca243fafea2ff2412a600e103f39e671a9b210ae