ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-DBD71BE31998
|
Infrastructure Scan
ADDRESS: 0x4904c0e67dea8a54890d819616f67c8bd8f6116a
DEPLOYED: 2026-04-26 00:49:59
LAST_TX: 2026-04-30 16:58:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Bytecode size: 3296 bytes. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Garbage collector: 0.41ms since last run. [VULN] Warning: IS_DEBUG_MODE found in storage slot 21. [SIM] Fuzzing input data for 67 iterations. [TRACE] Execution path: 28% coverage. [VALID] Finalizing audit report for 0x4904c0e67dea8a54890d819616f67c8bd8f6116a. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x9197974099ef53d4a882cec92d303ddda8f78393 0x32759c080ac65503e1f8f6140ca1d11eae9d7a55 0x5fe480f0b3fd4c6279630d9d8508aa5a91c52f76 0x9ebe68d706a82a78a5c1afc118b287dba91e1c32 0x7d84dedaf5e8982b12792e6baa07ec2a7aabc5bc 0xe6e0383e2d5a669b3a248beac2fa684ee8202f46 0x442d37d81dac3a36aa1949372454d617fbfcd108 0x1c1d0ff1a2e15ad86c16a6580dce594f9b86fa5b 0x09adeb29ca431fa897415bd0cff8534e1bd156ce 0x881904e870d61b14462ed20e253cf0a2cd0a472f 0xd2716739db542bedef88aa0044f23867a4ea2603 0x53e6e2ef61e205ae5cd327783b4372ef76c45838 0x8a122164d60f5c45f5adac34f86bab09ea5f3097 0x208909ebbe591e82d1ac4de741b0d222d637b243 0x8d5556560a5b186e1ce30d3944062fa50bc7d4aa 0x297010a08fffadd04b699917647d7a94e4b2617d 0xed8674b25683e599b41e19dd04a5cb3ef46effa6 0x272457ce4658c73745a80bbe176820e21495bf0e 0x0c556809da00fa524c01b4b44a302818ce811bc4 0xa3367eb54ef189f0271e6cedca246ec2fce3bbc9