ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-FAC94845DB7E
|
Infrastructure Scan
ADDRESS: 0x773663348b1a5b77de2bbe42c881fe0faeb42c14
DEPLOYED: 2026-05-09 03:02:47
LAST_TX: 2026-05-11 00:34:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Handshake with node 0x74f94ac0 successful. [FETCH] Successfully retrieved runtime code from blockchain. [SCAN] Mapping internal logic flow and branching. [MEM] Virtual memory mapped: 0x0000 -> 0x23e4. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Reverting transaction at PC: 9724… [TRACE] Bytecode segment 0x29 analysed. [VALID] Generating cryptographic proof of scan… $line = str_replace(’46ef1df6…5858c07d’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x9574ab91fdf7223a690cb3aae38a85409eaa8594 0x92edb3a1b3c1c91c47dd5e56b48ee2cc039dc7d7 0x4550229d27059f92be0a43a206ede1e2c15b2a44 0x88a2425b964fec01ea7d5da4652e83a9dbfc671b 0x335ef1c37e0efac2ca79f4843e36ac14681c18f0 0x7e59b8997f2296a703375d35c1127a35a39e3218 0x31e35c8202872002c80b5555f39dafda41bc0c9c 0x0a0d5127f9e122104ee9dd4c58b1b32b735f1b3a 0x936568f42075d05e6fe5266ef1e7c258f8cf3a20 0xda0d360cff6514384e49bc64c0bc4c66cc7472fd 0x56645595de96c3ee259651c9d13c1404e82599e2 0x287d38ca1d89cd3c435a8279ac9a3528ddeb9131 0x1f01d83dcfca26e1df9e194051a6354fd6f7d57e 0xeeab2e887b0dcdeae72880d7c25c9ba3c61810b5 0xc5ce9b8900c8a83f43f28c03b7a11e29275f0af0 0x5e9f28617af5eac92fd269c12a4e657aed912284 0x7252e2884d732d4539924fb7af6ea4d30ce21e51 0x216e5934c277f98317fcdd9abea5a0a266348bb0 0x14d65a5fdc4f589770ff4cea821b4986462682cf 0x3eebcab6f59280b92049cb2fcb657c97ea4eefe2
Post Views: 4
