ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-73E013702116
|
Infrastructure Scan
ADDRESS: 0xbf22c716169b057e07efdf7a57aac881259127a5
DEPLOYED: 2026-05-12 16:01:59
LAST_TX: 2026-05-13 18:57:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Requesting storage slots for offset 0x00… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Running static analysis on JUMP instructions… [MEM] Snapshotting EVM state before execution… [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Verifying ‘require’ statements integrity. [TRACE] Debug: 74d04749cb83cc50. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x8124c2f9eea7ecd8582fd0586df3d9bac73b70b4 0x17be376ddeacd4708a621fa61710c4b0fd182b3a 0x8a535fa8fea4e5218d8e59e85c882b1c70bb05e9 0x1c3c7a309bba2fea08c327cfca5b699c1e774a33 0xa7e413d2b97a6651e446a471750e5443e6590cec 0x8c0767ebf391baf84399f757de31d57d1c6e337a 0x1a9ec58cf43db180875c1b93504ab24cc10d1a43 0xe0278d9bb1ad1a7ecade5f31a8a6f9ef5e037656 0x280d262b3cb620ac14036962d860d16bcd498207 0x224f1a667df8ec8f70be415ecf972546918f492e 0xf108586d1fc330ea1d4ea4ff8fd983cde94279b1 0x53fb846c756bc05f2b6d9f0bdf5e4eef29b7945d 0x0456a9b65b1b215a348c5e0a4818e2af94223c0e 0x6582c770fc4167aa807c3846c73e6006e90c169c 0xdfb625b4258ef24b21c9d5fc094a10c3b988ecdf 0xdbe9e6fcdd71d5628c974d264a6070411a5939f7 0x257fa55f34ff7edf8e509af9f5541e1e2f61c4b6 0x6fcd3a4490559c92dad21072cd9c3a112a8bb1ab 0xd32d36d899a3c09e39284ec0ff3e5bbae9043a16 0xd4ee2ac2ffa605df3f34f6ad202de12dd9fcc124
