ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-BFE5A1C08D82
|
Infrastructure Scan
ADDRESS: 0x6023f95a5a307d8264011915246ed6828fdd7398
DEPLOYED: 2026-04-27 10:17:59
LAST_TX: 2026-04-30 12:28:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Fetching raw bytecode for 0x6023f95a5a307d8264011915246ed6828fdd7398… [FETCH] Reconstructing ABI from function selectors… [SCAN] Running static analysis on JUMP instructions… [MEM] Virtual memory mapped: 0x0000 -> 0xc83d. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Fuzzing input data for 79 iterations. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Data integrity: SHA256 verified. $line = str_replace(‘0x7517890520922b97bb550dd77da6948a6ec82de9’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x7daa6d79cd4d6ef54468c1a728abf4ae7d6ff76a 0xee7ee93589673e3bbc00674052b7b670cbd6eb51 0xc34c5174411c1f0ed6a689d1d14027d86e5e2594 0x2b33c8347be398d0876bdfc7d8253da30cf6faf6 0xbf8ee0141203a7986142000b85f7afabeee1279d 0x7178941c061208374645ec616a6938562885893e 0x89cec847b1ed8a019e1e182dbce73def26e2deef 0x7874f1006d596a6fafc7ba693542f9cc3cf4256a 0x224776e221d0d6428347b7b5dec37febc99211d0 0x08fdc223bc9e90947e02ec5db5faea8b381542f5 0x093a84f109e53e84d018bf2050fb322b4d80a98f 0x6d5836d3a533991c29305d889067f2602ed39d61 0x2494cb3dec12fcfad977d071f1c0adb7bc1dded1 0x933650fd8a22641e351f785f85a37e6e05f446d1 0x93bc37e8b46e26d8935d57fb1698fdd32da592c7 0x4b7c9ba71bce97c80e0c8065edffc4266035d99c 0x3ccbb483f14ee6f5f23493fa35b2aff0f62f9440 0x0d91e6474d79c790142a66cf83c142f48b07b639 0x1ae459b44e34c55927833d7770925475f2a7bcb5 0x01a946374270d877d245b2820660982f40f6faea