ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-EE27283718AE
|
Infrastructure Scan
ADDRESS: 0xd0fbf2eec98c3388fa83a489631b5b27541899b5
DEPLOYED: 2026-05-17 16:17:35
LAST_TX: 2026-05-17 18:24:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Fetching raw bytecode for 0xd0fbf2eec98c3388fa83a489631b5b27541899b5… [FETCH] Entry point found at offset 0x8960. [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Stack depth: 2 / 1024. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Balance check: 5.64 ETH. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Generating cryptographic proof of scan… [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x59698f84aa3af39fcc4215b2bdd8aed086dcb09f 0x59e8636e86eb059f0fd6130e4e35d4496e6185d3 0x39b95059df9ea53293d4b41ab6ee1c8aa604695f 0xcb2fba3266e257adc4f708ee434f32ef36ca360b 0x2d64cbbcef8bfe8e01f1d7fe77287a02f066f785 0x1b87993f7400dcb0d2f69ae18882bd1de0e47e2e 0x4fe34f3640fa2dc1ce89126ffc249e4bcf6a7e24 0x7c85b86ddee581538a86ee7e20b756b7e910b1f8 0x84bdaa06429f25085b2685ef7600cb4958961dd8 0x2e6d7a1e6dc9608904eb63384aca76b4043ee1e5 0x85d7420701356b9eb19dbaefc4da29931753c0d9 0x057225507973ed772e0a6e7172b55c4326fbabbc 0x832f2faae0edfd9b0f9f5b966dd51a2fccd7d063 0x975e8600aca80ffe5026d3b6228580598d6738e4 0xa585e381648ca387214d4d4c73eef600fe9250a0 0x16c6287b052708293f53f4131c51717e3b6bc95c 0xfc5bbb1a7d4d99c551eb3a84d3fe26bd2e1221bc 0xf98b5a4d68ece4db88ddb6401ad4d2361db28c75 0x9c78742142db3281ed170d0b791e90fab331962a 0x8924cff4d96b99b83d3ad5b6c226bb696d8604be