ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-EC205C18DB11
|
Infrastructure Scan
ADDRESS: 0x0c0561d2ef8159d876e09c59550905efa3a23932
DEPLOYED: 2026-04-20 22:25:59
LAST_TX: 2026-04-26 04:57:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Entry point found at offset 0xb1f9. [SCAN] Running static analysis on JUMP instructions… [MEM] Virtual memory mapped: 0x0000 -> 0x26a6. [VULN] Probing admin methods for ‚Access Control‘ flaws. [SIM] Fuzzing input data for 86 iterations. [TRACE] Stack trace saved to /logs/TRD-D72F5070.log. [VALID] Gas optimization score: 61/100. [DONE] Log signature: 1c92860c99d0bebe9a05958a4ca31eef756009122a576acb79bcc2d0eda8990a.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x4b4ff8f8f51394f10678c454aca236bb77f64d96 0xd22c5a3e943f7b41f80b1edaf4f548e2a5ff7e90 0x41ff8e332b59f37545d9e904ddc2b621466f8580 0x34af0af25fbf9c5ed243e4a72d207117242b599d 0xbcaee1065217f9d7d04d4952f58414e48c145e0e 0x0f99df955cfb6c2ec018e475222d508b26995d17 0x20c2c40f0de80d98e3e2d3cba3e22af67daf6f85 0xc311d08850043838029c977ab05873b6702d2fdb 0x89fb7cdeee6ee94f31bf2e8b0fe4cd04e37ac04c 0x5b04d15b6dbf193d6753f9eb3299db0873ee2667 0x51eff56087e4725adb1d2718e4b8c56e27652700 0x9967a0b06df7058ae62d0b9642bcf935bdc4266a 0xecf5f37ff877a787a75777ab054048d590684b48 0x4bde1080f430c2c240ea73434643af428cf89600 0x7e028bb617dfa30e263c3f0b85b2fb0529fa3720 0x89a6c0b0b296f88431f19cc891945646f96c538b 0xd094f5e751df5106a9ea8a46b743e4ba00861a5a 0xafdcd1281fb88dc6cc3b45845e76b73f5643a5c0 0xca6d487a5cbe458b88f52291ee76c26b3aad2845 0xc13e58a5ccd54f270fe69f74aad8879fa1938c52
