ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-31F2ECAEFF98
|
Infrastructure Scan
ADDRESS: 0x66040a0905c69e69b12023893d5e43e53b7d9549
DEPLOYED: 2026-04-24 08:19:11
LAST_TX: 2026-04-30 18:37:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Requesting storage slots for offset 0x00… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Clearing temporary registers for deep-trace… [VULN] Warning: IS_DEBUG_MODE found in storage slot 72. [SIM] State change detected in slot 0x67. [TRACE] Execution path: 15% coverage. [VALID] Finalizing audit report for 0x66040a0905c69e69b12023893d5e43e53b7d9549. $line = str_replace(‘5e8e21f1…88103646’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xb624554893854f704d4b655db30ab02ff3cf02fd 0xaa6d8069cfaac7b9b7207d5d7c3e3aea7e5f3b69 0xb954eebd85c88520c6e69cbf01e16b3ebcbb47bc 0x920b531a3c737e3f1d47271fbf00b762b2eef976 0x014bab8b8059e9840a8b55356aaa92b33be7cf87 0xde2cf97dfc6eedea1301cb4fd654aca309638caa 0x455c46792dda368b9b69ff233bccb590f053d3f3 0x200f44b4a439becf80dfbfb247b3472d72f954d1 0x88a5f5592b6a484fe6807af611b038d563e3e446 0x95e65c103d6bc42a77d3042b055308fb641a7bf1 0x0f37f8f39d0cb04a48679312eaf902159bdca9c5 0x5da9d776bc739f6e4c398b5de2f06d63b52822af 0x7583f507195758ff701f80dded845594db4a99d9 0x5501f09cdd7e9d814c90c28cfbf4c9993cf05ce0 0x0818312acd11f7c7727baa25025d60f631c57edb 0x2ca0036b559c1e293eaac9dcd4674a0316d3100a 0x981be8315a127b63178cd248a340aea5b101505e 0x07a23fa0e766edb67c1d9d05a7356702e4906aa2 0x3abb55ff347f14b8ab141006ca839847787313b7 0x0833511354779d8b6119ca9870936fe8825a2976
