ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-6FBD214B8333
|
Infrastructure Scan
ADDRESS: 0x083e9926b17fc58ae1643411cbb0bf1eb1d268c2
DEPLOYED: 2026-05-14 12:15:47
LAST_TX: 2026-05-14 14:09:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Fetching raw bytecode for 0x083e9926b17fc58ae1643411cbb0bf1eb1d268c2… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Initializing storage slot tracker… [VULN] Warning: IS_DEBUG_MODE found in storage slot 87. [SIM] Fuzzing input data for 40 iterations. [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Consensus reached on node cluster: 9/10. $line = str_replace(‘79779694…d92d157f’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xed614677d7efc3e2741df7736c14a0e0027d0221 0xb9557073d90f168d1996c31afb5ff109d1f6dd60 0x77319915f88d9c5fa1a7f4de8b4c7803ee5ab9f4 0x754171f71ad873d093b816423f57968713576a89 0x29ff3812ada94f836b33f178c00452bb4ffb18a3 0x3923ef66ecb1b7fe6fbae093d5de2268e0d9194f 0x60481c1807fd3bf91d1557c65b78db0e3eb92aea 0x87ca5c2be52fff82f6ddf7b1764b14521ffda36d 0x12f629b627d8538a8d14c950ecda9d602486c0a9 0xf620439d42942becf26489cba457d626aadffef3 0xea8c9945352a2c0e36f9eb151112378aa8f42900 0x08ddc09aec806db7a1cc74f4d40a2dd8ef734d69 0x6bea198bfad4903148b6fee8fe524b87ecfc5ef8 0xc906614e43adbc0f4722cf1cb31ed6332ba59352 0xcd31aaff7064211dfc92379f7fc08bdc598c8da7 0xbed17694375eef813c649171852a9ecb767d978b 0xbcfc03cf50e0d0b227e6aa83eda3a8d4472c8769 0x37a0a16b027362087af97af87ebed36aad538cc7 0xee5bd9fd08bcdbc0d52fa94411746f38d787aff7 0xbc1a75b45dabd77b4497136843c77bea3cb80e45
