Category
Date Posted
30/04/2026
/
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-2D7EBCDAE23C
|
Infrastructure Scan
ADDRESS: 0x91dc78b21df1ec810c74ba4493b437796daccf29
DEPLOYED: 2026-04-28 02:28:23
LAST_TX: 2026-04-30 06:05:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Entry point found at offset 0x30dd. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Simulation buffer: 1024 KB allocated. [VULN] Warning: IS_DEBUG_MODE found in storage slot 18. [SIM] Mocking MSG.SENDER as 0xad12479f7503a8d01daa8383473320fcb4afd9bb. [TRACE] Stack trace saved to /logs/TRD-4666E2B1.log. [VALID] Security status: DEEP_CORE scan finished. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xbd4921cd159618774061fb15ea6d276902df4173 0xf12ddd4688c7b710a6f7e2d30cfe6c72d98853d1 0x786866c64bbc4ccc4cc09fa2334d70421cc85f93 0x0862c576e08cf97cb67f6a3178e6421d0400b270 0x129f00b03bfa2b42dc39a4d2d36a83088a1ddb9a 0xc3848cd5bb4c507f65be6ca6b4ddac721be11d74 0x4f949dbd01dfb85697b34dcdabada34ebbbf73ae 0x97ec6b7cd5e23a49908f16692bc35520291d59bc 0x9cf8bf1669e0fc883baa413b309903bc417cc82b 0x49564a21c88ffd80a02eee7282219d7050bd939f 0xe8a3b9496a8c4242a73d3ae807e73498a9d27ebb 0x7ec5bbcb55d2d24cd45d51c057219054bbb7800f 0x533a35cc200633dcaa7c186247ed1da209171861 0xab531f6a9ea05b83e3fe6be0482ca777b495c6dd 0x77c207afd53934dd9ff31185af1b516085baecf2 0xb95db71bcf01e53a1f58ff184d0490e07c4916b4 0xc2f4383cc017a1b29e0ddba48ec5a7b77e7165bc 0x41b3459b88e45acdc39a17ac91ab2dad98cc73df 0x0e1a3f4cf05829a25d5675dc6a3497eee50a312a 0x7a95864e81b8f359ea335eb176676ad2f525075b
