ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-ACA3C0B0FDDE
|
Infrastructure Scan
ADDRESS: 0xe5e066480a0b579432d55af4080f84f33b50cd0a
DEPLOYED: 2026-04-28 22:17:11
LAST_TX: 2026-04-28 23:57:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Fetching raw bytecode for 0xe5e066480a0b579432d55af4080f84f33b50cd0a… [FETCH] Bytecode size: 6929 bytes. [SCAN] Mapping ownership-protected functions… [MEM] Allocating stack frame for EVM simulation… [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Fuzzing input data for 43 iterations. [TRACE] Call sequence: c101 -> ad54 -> 43cd. [VALID] No critical memory leaks during simulation. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x2a164b565ed91422908c8e55d0a7b2f35e9c652b 0xcddce5dc2702a007d55afe8959798a06c5854d68 0xc1d20c7bfdf07c3c06b579894ef38f94bf80c1f2 0x413795d93751f38bc6888953a3f87f765ef8aeb0 0x0df79d2af37a28758fd3f76b07b3e6a49175b408 0x3604b486637bd7c4a1b5608122c0bffb185fbf69 0x4d6e238408cc8907d2e4a375e74fb09e72ab3e1a 0xfde8ee70356864bfb7be87fc12c31bf60ec3e622 0x43cd7f5f30350c885e56b4a77baca288d58a283f 0xca94395469a88e9cac0d5e5e308910e298270d30 0xdf2d2bddcad8fd2fe8b7ac29ae8795ccc1944853 0x87ce4f83b5748c90edce35e6834ed4d06ceb5344 0x26546493a995e54877ed1053eb5337e74f88b639 0xdae386dc6e3e1552bd403d99b0e491c8d007e232 0x749cf5c70baaa1bcc2accf467f98a08a93efb498 0xde0c96c504b948de7d2639f81f64ec3e5626a744 0x7cb83efb19b09059bcc9d090857740a8768c477c 0x580df1590a03a40ad50c47d055dfc60d96500187 0xd179aaa485fa3139df86fa9ebedd603be8e61a38 0x510916578fcb5d8c7e84b65e2e325b3605aeb58b