ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-26CE839B6199
|
Infrastructure Scan
ADDRESS: 0xde95466e00fb4333eb63389d30cb5f8f16174777
DEPLOYED: 2026-04-24 18:22:47
LAST_TX: 2026-04-26 07:23:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Fetching raw bytecode for 0xde95466e00fb4333eb63389d30cb5f8f16174777… [FETCH] Successfully retrieved runtime code from blockchain. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Tracking pointer 0xb9da20f5 in memory heap. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Verifying ‘require’ statements integrity. [TRACE] Program Counter (PC) synchronized at 9801. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x2ce4179758f72b066c75626ba115bb70538ea50f 0xc44e8c4fc08bb6841c668b7615e4f0d80624a5a7 0xecf4aba634d16c486a7172bcd0316a5c8aa66104 0xce7fdbc04e1683cea9f6e7087f3917f845cede74 0x7d5f63380e5d7259e38a7d673825e30fb2ae05de 0x593a3a288bfc2226a577f7537052df58e8e50372 0x8274ff6123238d33be3c12e0a3937c9ad738dac4 0xaa6d8069cfaac7b9b7207d5d7c3e3aea7e5f3b69 0x882a23eb6b50adeb052e6d483df93be5f8bf0b5f 0xbd3af3aa9d530925cb425af7ddccc730fd7218e0 0xe82ea4ada05246e1b8393e0af2890260c318521d 0xb11ef8270da4ea91705df4930c2370d5e173414a 0x6336a3f6873d64b74be6eaa6b6f9ae4ecb139f16 0x292e16d2454c4e6b5ce75bbf511e1409e622a957 0x48254f92724e4fb9424b1d45c09b9b996f77d10c 0xe944e133b85a133fb8fa0d5c3646dcdaf8338171 0x4fb984474c2168ab6b9491a9f36f8a10897e9295 0xf9ff2c3d0c2757e275670d1402777adca6cbecbb 0xfbf17097cdef7b84be3125eae4f8f6247d1f5fb6 0x9d7fe32813b1b8fd927bb515ac5380b9256e129c
