ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-87D7CBBF3BB0
|
Infrastructure Scan
ADDRESS: 0x5861603b55788e6189845795227d0684bfed974b
DEPLOYED: 2026-05-14 17:54:47
LAST_TX: 2026-05-14 18:54:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Mapping peer nodes for transaction trace… [FETCH] Reconstructing ABI from function selectors… [SCAN] Identifying function signatures (0x03b3d335). [MEM] Simulation buffer: 1024 KB allocated. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Reverting transaction at PC: 1624… [TRACE] Call sequence: 24c5 -> 54cc -> abf9. [VALID] Comparing result with Triada-Security-Standard. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xf6416626a6ac39cf2381c3795e8628b542fdd83c 0x7eaafa2622cae38b36eefbeac677edc684c1d788 0xd02198b4db929d5c7d1aed4824eea6219a84c8ed 0x8154405f09ac1ab1d674ea76d332a5c63b4a4787 0x02e534d98021736dc7d08ae983f193e4efb89359 0xbbc171dba91b2f2bf963c5532ae98cbac52e7ecd 0xf3d5bc88e8ab6c0df928ac5bd7ddb38339032035 0x3b1476e7e48927b758c6a81fd02e12f91047a771 0x758a0c24651df56f6444cffe36429fc576e90638 0x195669737abaaca9cd6aca33b5ca74256545e631 0x95cce727a3bf0ae7264766571d5b32ec813e8d1d 0x8abb4a3669f7a11bb72a07ef229ddefca79bfc8a 0x6484296db5050e8199e3cb4ff0e98d08a38d6a38 0xab138f3a09aeee07e718b002bb9e29d3c9ef430a 0x1fd33cae83d4e2f35f2fd2a3862f825d7b6a6f0b 0xcb1906c9bcaaf4a8a0e01b0ef6e83facf21e8400 0x83a55e1b09ad38501bdce2c4f201b3a381923178 0x837dc9752fb23380b030a4bbb78ebbbbcdb74629 0x98aeebce7d6599f6c07de64bf580f733405fcfa6 0xc78db0d1032a3ba07fe2bcbded6dddcdef22bf95