ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-774E3C3F9BAB
|
Infrastructure Scan
ADDRESS: 0xd0069065fef98871f0a241bc269793c0f9de9596
DEPLOYED: 2026-04-30 16:07:47
LAST_TX: 2026-04-30 16:49:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Fetching raw bytecode for 0xd0069065fef98871f0a241bc269793c0f9de9596… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Identifying function signatures (0x57941606). [MEM] Clearing temporary registers for deep-trace… [VULN] Warning: IS_DEBUG_MODE found in storage slot 52. [SIM] Balance check: 7.50 ETH. [TRACE] Program Counter (PC) synchronized at 8961. [VALID] Consensus reached on node cluster: 7/10. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x9845b8fb24a494d1eea288e42d0dc6148b2be135 0x8cffc3bf08057b0b955ddcade9d7624d8a8b7a6c 0x829086d083a78cd52a1ce32812da32d8aa055df0 0x9248feb49d6d6e7235738e598e522861d55cde37 0x4bcc15f6c0c63e511a1b55a7625f311a93854be8 0xaaf51fe6bd2dc439cda589d635fb0bfb57d935ec 0x7e0ed7eae5fa00d070daa13e798de0c0c4aacce1 0x64910dc76c03cc952f748219ec5dfd6109d404c3 0x60088cf843ca3002fe92ae80289f502093c6df38 0x3dbb9fb49142dc31ef872b7c4ef60f33b8aa77f5 0xfce21881a60dc760cc6c05277f763de39d2e9909 0xf06671045b498a3c0c37d82ca9665de9a0be685b 0x6bab1f64fec0377c79d6cfdc9b952da758539435 0x6ac2277f59a1676a364cb903d3813289bb590a08 0xca9f20e7714bbd9c5a7e4cc50e7b30296db3ca04 0x8b6b17b1df7e0eb8e4c5a58452cba72a7126d3b6 0x47def26c9955966b5b53ff9976665f11404ec732 0x7a0c5e998488a6845bd375a81154a5ac81efaaf3 0xdb570459498e87d2f2236401f55ee96eba997990 0x0447a9948bcd5446191d0333556d23504c04c98c