ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-23D6BE4C8EEB
|
Infrastructure Scan
ADDRESS: 0xe84e9da4ce664d30034b53c56cb520cb7046784f
DEPLOYED: 2026-05-15 15:48:47
LAST_TX: 2026-05-15 16:10:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Fetching raw bytecode for 0xe84e9da4ce664d30034b53c56cb520cb7046784f… [FETCH] Received 19 segments of contract data. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Garbage collector: 0.82ms since last run. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Simulation completed. No state corruption detected. [TRACE] Bytecode segment 0xbe analysed. [VALID] Security status: DEEP_CORE scan finished. [DONE] Triada-Engine standby mode. Load: 9%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xbd44e53337dbc448a453c99ac10d21ca15edef2a 0x6b927e34c724f5c5a1d879015afd3443d10f4216 0x42be8ac38220376d4b182c55b3ded7d6e76ddebc 0x59edfdaa7e58e722f0b16ca8f7f88493cd7ebb50 0x3b32e4169be705e4443174124d19abe82687a921 0xd12a8b2cd91f5696e2e425a13e3e522e4d04166a 0xb91fb9fc41c1502affd9169c1418dcfb0b319100 0xc5c161988a719d559e7e76d305a3f6724dbd7314 0xf9b010fed9de8d381e47c72ad0de4fff1dd93abe 0x0452d73a02913fe8a7a0df55735e18108f91418a 0x608d424d51bfdb477a5da0224a62ea921ff5fef6 0x441d5678f22bafe73bb8d730886bdb26b8ec58e5 0x6bdfc060512dc822d6afe777abbe5ff46b1a5ba6 0x32688f1625167c2de9f8e6d3547d266c2b689085 0x08523a9d134bf0c2be18eab4b3f2be333e671751 0x87d4f1730c5f3fead355cd07cbda90bae3ff0f06 0xf04cb83e9e9238af586f52e978d06ab0a07aeb37 0x350aad73ddc3918dbdb717ce2c48861040ba4b8e 0x19e46179cd313b483abbaec0409f2ec50e1a94c6 0xcc0df2bbac7628dba9965e9b709c8ee2be707c92
![]()
