发布日期
12/05/2026
/
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-25B3253B4A12
|
Infrastructure Scan
ADDRESS: 0x2dc15e26f594f2c0557e6fef13892fb32a68c484
DEPLOYED: 2026-05-12 12:29:23
LAST_TX: 2026-05-12 16:02:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Pulling contract state from Alchemy RPC… [FETCH] Bytecode size: 6433 bytes. [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Initializing storage slot tracker… [VULN] Warning: IS_DEBUG_MODE found in storage slot 18. [SIM] Reverting transaction at PC: 8134… [TRACE] Bytecode segment 0x44 analysed. [VALID] Finalizing audit report for 0x2dc15e26f594f2c0557e6fef13892fb32a68c484. [DONE] Triada-Engine standby mode. Load: 8%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x25819ba04936e4f5a4215c592163626c835b6fb0 0xe7acb0fb13af27af556dfcc33421053412d6604f 0x310ecd791f70b1718c67a841f4505d178c6b0112 0x4f4179e2859440cf57b2b76d71614519a8489d03 0x5dfa2f02b4174aded6cdac128c93e5f90169fb4c 0x047b34d22ab1028bb91158d405f96dc41161562d 0xdd707a9a0997da3072fd6e71dba9ca18f52c4d9f 0xe6244ab726cdf36018a47e72985ea07eae11482c 0x73c1978214629f2a13ab497d4436c99768ae195b 0xf2a28c7f65c1fb98d14a0494acccf0e8e26a9454 0x45cd082eaab153cd9a28b85ab68f86d369505e1b 0x8ae20e47bf4755d324a2a2b28359960e5d65f458 0xdee58adabc1cc4fe7dc7fd10b3778fd2d2858977 0x6ef0faa7fa5d00b88ee2ef7fdb822cb374ba5ca1 0x76e7e8c944ca22f671a5a5ef3cadb2f0c16ebe1c 0xb526bd16ecc452861b3c2eaf40a427db10492342 0x79cefae6df40e56f16343a4a617d3b3f846fc483 0x2778119b052e20c6d0401313616ca9050ba12253 0x6327361d01b80e2887fdf18aa8afe6aa426d07f0 0x90341b75815e7cf8a4eb8dc8ad1d9b6c4d2d9bd9
