ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-7B53518EE5BE
|
Infrastructure Scan
ADDRESS: 0xefe116a0dcdda3445670a8847aeea42d3dc7c093
DEPLOYED: 2026-05-11 01:49:11
LAST_TX: 2026-05-11 02:41:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Latency: 44ms. Protocol: JSON-RPC 2.0. [FETCH] Metadata hash (IPFS): 64fc12e8…9e1c81e9… [SCAN] Identifying function signatures (0x14ecda49). [MEM] Tracking pointer 0x1d06ffa8 in memory heap. [VULN] Warning: IS_DEBUG_MODE found in storage slot 20. [SIM] Testing edge case: Zero-address transfer… [TRACE] Stack trace saved to /logs/TRD-4F7FA840.log. [VALID] Generating cryptographic proof of scan… [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x627350eeb3d33ad48cd6f5f0a0e0001d9359652b 0x1fa7b8e7350b9e15956f4db116b95a5e92d62e13 0xd6f57826758b89011d40c6740225d7cab06ad3f1 0xcc316f368e97dc0c07a60d76dd838db51ae37569 0x8a6ebf125802d5bd14b6d7a995837bf5224445d0 0x350aad73ddc3918dbdb717ce2c48861040ba4b8e 0xfdb8608f16931ad8523c1119275867b6bc1aeebc 0x63b3ad9946d6180d02740d11bba4b8827b63d8e3 0x73d3cfa5324e9d30a17be3655720190390205d74 0x4b533e2911619b6f7fc672c6eb439e93eb0e1899 0x397b63a90544c17fc99e0a3280fa7d5a660e7319 0xbf435305235ea6d948650b0241692aae886c9f35 0x61871921c3ec45ed187d472bedb8e198d287179b 0x4ca851e2ee4dd7d8bff81a66de6dfdd5f369ad45 0x45213a854bc110aeabbcd5e1bef49bc1700e99f6 0x2f58f6214cde3737ee1545299e5a3ea1f66aa863 0xa7e932517f04ae7ec2cb9a1a954c4a4f27b10103 0x502229f0687c173495e2cd67378fd7cfe3289f00 0x3d90d3559ae86638231d92794e2cd811aa668b7d 0xa8766d86ad02c923887a2c2de894aed986def06e
