ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-03AABBDE028A
|
Infrastructure Scan
ADDRESS: 0xfec5db3e0b274a32ddfe2339997fbb6c21724883
DEPLOYED: 2026-04-19 17:47:35
LAST_TX: 2026-04-26 07:52:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT
EXPOSURE: Legacy_Testing_Interface
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately!
|
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Synchronizing with block height 64006. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Mapping ownership-protected functions… [MEM] Tracking pointer 0xcb949866 in memory heap. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Mocking MSG.SENDER as 0xdd37ebe37eec0e588e44bb9e2f987e1882905082. [TRACE] Execution path: 15% coverage. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Scan task 0FCDD75F finished in 83s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x378709f05b3a614c2c8e0bcd0c4d68c306a4af08 0x99882ed2dbbd8ce9a88f5942ecb2a9170c414326 0x8665aa4b4ad098a1be35b1d18e4295aeb9e6c4f8 0x3074dddb01eb205129252020ecb07fbd12296259 0xdead39eadde6adc8d43d5142dabe52c168b63a84 0x2518890f8bbc19c1a6bdedb3b450471d0db54cf3 0x4cc08e29878437326e24f8ff115ac02376d7cf11 0x572e1227d683721ead38881efadae3e4aa247eb0 0xd670741765f6a7d7e7415bcdf949da05639b72d5 0xb50bdc00412f7dc0be7a6701f2e9f1a3bc94c7cf 0x559657c3e8acd2c8cfb73fdb3c43923b91ce9b6b 0x1daf152e8f761d661bbb38d522e416931585a781 0x8776fab4c8d64cc866ad0b227baa82cc398b80f1 0x2fadbfb6b08ef5a268840bc07a7d6792c28b46bb 0x3cfa61121e89ae568920a4f66b8ae41840b04441 0x03f57d301c7d8039ec52133cb373c758ed6b02a1 0xb184531338a21f44afaa133bbb22f13141961cf0 0x3bf3ced4bb3f34bfb687a57450b405bb0cbaa5b7 0xc92b046f7755dbb4ed64a7dc17f6cfe29791d3f0 0x5e83cbc93a1d81b04afd4ac07707f518824ca59a