ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-486A7C6E7E41
|
Infrastructure Scan
ADDRESS: 0xe157f15b1ca176ba69cfc5dc03e1eb9f46909660
DEPLOYED: 2026-05-16 19:03:23
LAST_TX: 2026-05-16 20:02:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] System integrity check: 100% OK. Initializing scan. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Tracking pointer 0x68db4e33 in memory heap. [VULN] Warning: IS_DEBUG_MODE found in storage slot 73. [SIM] Reverting transaction at PC: 6677… [TRACE] Stack trace saved to /logs/TRD-F699FD76.log. [VALID] Finalizing audit report for 0xe157f15b1ca176ba69cfc5dc03e1eb9f46909660. [DONE] Triada-Engine standby mode. Load: 1%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xc53129cbff0c95c5748f8c878c8d4e8a5e444316 0x7649e7e5f675fe6c89b74406f7ccc3c581f9d94e 0x6ca8fb16971c7a420f69d90b741be20d5af75fd5 0x4af4a45676d226edad0778329e6e7ba0d90b7a9d 0x3b5f6439118f2f488d63f61241b4a6a5a54393cf 0x2eedc04cf175769dd2925810bf97018180819129 0xa06d40075e9f75e51ce97ae6a0fb87d7517d566d 0x81da75f2225c77e52c64fbc47eb2705e96d19fa9 0x428cb12af4c99b0b8f5971dc25fdb987dd3f175e 0x5beafe09c75ae8e57221b86082c187fd7e011dc9 0x773b7724269a1cddfdadc6fe0117586a89f0347f 0x5901201ac2ef8a533784dbf5f5293c53c74b0a4c 0xd975a98ae9d00902953d752841f3f8851fcccebd 0x665c719117c42b06d3c2eab5cbb216c3eb0d51ad 0x105d2578eafe3477279f89905fd36d6fb1704613 0x39859fdb9b46b9bae7b390729e46f7f9ab51e7bb 0xdd1a273092596b04eb85e44afe211d825a1275ef 0xfe88e7faf54c2b628873be6816298565ee0190d2 0xc5934ff808e4d7b06d2f3d4fc722b7cc543be3e1 0x46f3d753639c25bc9d683c51632bc9de69d3dcd9