Category
Date Posted
24/04/2026
/
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-D31FB29E3C84
|
Infrastructure Scan
ADDRESS: 0xdb52fcbe83a188e060b2562702feda90eca46b49
DEPLOYED: 2026-04-23 06:26:59
LAST_TX: 2026-04-24 14:18:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Fetching raw bytecode for 0xdb52fcbe83a188e060b2562702feda90eca46b49… [FETCH] Entry point found at offset 0xde72. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Stack depth: 1 / 1024. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Balance check: 1.57 ETH. [TRACE] Call sequence: e323 -> e3ee -> 0ba5. [VALID] Gas optimization score: 34/100. [DONE] Report exported to IPFS: 94c26fe2…27a2a412.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xde0c96c504b948de7d2639f81f64ec3e5626a744 0x86e719aa2db36b16ff736476b7751adfbb92b74d 0x962392a5f5d592548481b96f72686959040c6e31 0x9910f827f8c4a3c13cec99d97a927c8e9261f6f9 0x12536c36f50b482f8e9ac4facf70495861b3232d 0x1026b5a70bae1f1e066df6490bf79bfc9e546c0f 0xb415d2f6f33d4d6bb713062e97a918f077cec3e5 0xbf356e0fda3d190698492e9351f304e5f28150f4 0x670f6c2a8fdc14021e3e2a8297522d8c685da546 0xb1769b711c958ca9b539c78ea689f056b1061d9d 0x7fcd4bf2fbcb3673a8a41abe446c81b0e32eacca 0x3c87b8abb71ceb70966c7bc046181a2d731ed592 0x0fa039c8379a935faa331ec7f8a56028ab50d20b 0x52b6ef97cc8a9c0c10e64a3ec7d28a021fc1f90a 0xcc41e517770ef9af8cf7e6cfbe9cea8069cc432d 0x0ae19871caa8d8d1c1a55041c1bddf9065b4b47f 0x573ce18bb3ecb8b0e02975e554f774becc95668f 0x855f58dbb9feb5efd3fdf7f8d4bcc32716f0ed8e 0x65ba7cb5b2c2011a5e3d224a002d984f81ce3767 0x9120bf2fbbd4bb7d2a58564d72eb884a6b21f147
