ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-9546294ECD03
|
Infrastructure Scan
ADDRESS: 0x0e74363bba068f2a9ce31aa035a0610b020ab41a
DEPLOYED: 2026-05-17 13:10:59
LAST_TX: 2026-05-17 14:03:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Mapping peer nodes for transaction trace… [FETCH] Entry point found at offset 0xe3e1. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Stack depth: 6 / 1024. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Mocking MSG.SENDER as 0xd116f4044c244a5f4990207bf19c72b42288bb16. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Signature verification: 0xf5389c6168645f2deb7d0a47f6509c0f1047e8e3f2c9c7aa515b5184a06c955b. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xf65a70dbe001692e27001db44469f18885160e69 0xb61948fbbfa1f0421680491e2b17929597617c6f 0x7606f8e947a49bb1445422a0faecf64ba5d84fa3 0x49671aee45c04309ccb1d4e887ec0631b8de2c6d 0x3b99bdbfae483cb910b1661250094ed872c1df3f 0xbdf3b0430c325fc7cd94a7650c7765cbb7dc981f 0xcfcf3a9aec8a164200f83727781efc08eb5b1a3e 0xe59c3f789a59a569b72fb29c1c5665a41701b8a2 0x7d12d828505efd90fda240c08116beaf7361865f 0xc090711845d2b0ced43afa4c0bfb9a1f42624274 0xb4f7f22499009bdbf8ad167a4c5c1c55112ee690 0x832f2faae0edfd9b0f9f5b966dd51a2fccd7d063 0x61ca05e1a6bb2d046e074dc09ed1967541639e66 0xa493bd7172d10cb0bf63bd780f2854e59e48a231 0xa56541f48cbec2ee5ea3ece71ba30cfea825176c 0xd13cea0d3bab7b7ba6a42f5aea53903106954447 0x33c801c15b824bb933d32eb58f08ffc3315335fd 0x73a0ef92a048aff29c03ee9ddad7a255121cfa67 0x2823cb0b7625b6c8a883514433b851daec86fd24 0xe488e9f96035391f83f977644f7af280067de4c4