ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-196D5D5861CD
|
Infrastructure Scan
ADDRESS: 0x0794c1ac1cccb05d600bf4e9213fd32012a53fbc
DEPLOYED: 2026-05-01 10:53:59
LAST_TX: 2026-05-02 02:37:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Fetching raw bytecode for 0x0794c1ac1cccb05d600bf4e9213fd32012a53fbc… [FETCH] Entry point found at offset 0x16d8. [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Stack depth: 2 / 1024. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Gas used: 53612 units. Result: SUCCESS. [TRACE] Stack trace saved to /logs/TRD-8CC43E41.log. [VALID] Data integrity: SHA256 verified. [DONE] Scan task 109BB119 finished in 27s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xdc0e3bae7dc75e9999704af58e955d430e1618c5 0x00a4fbb740d068576c377e480de0a0684215a7a9 0x845c24b3caa4be358505633e6a91e8ea60f17661 0x05ca0a101ff7c51f1758b044a1968aa0ddde4b22 0x1b7cf716677dfaf7388b2f87a7bea9a0ae1d4042 0x7d89cde2e38f514ae72ec89f7f336c696d35a512 0xdac50a81b9b0b512ecd31d0af8f4ba778f4ef777 0x83114ea3601e3d6fc4fdfc77e7ed5240cfeb5f30 0xe2007606314ae1dfb2460c73c39f2e36e56e2765 0xa9050313f69edc3930357cc9415ae56aabd84da2 0x96ee649d2f90c1a0b66120aecc588506839793ef 0x5e1ab4bce7a93332f0ae7862fb4473242607056f 0xb26e6ce90d88fc9a4aeaae2b17aaf0bbce916c8a 0x5bcfac5619760a871a4ec4e33c92cdf96aa17cbb 0xd749284c1b7070f63d575605c616c61c1f7eb7bb 0xced30b471d44551a4b42d599802d0420119f49c2 0xbf260b6595fd861e4b7f9bad59250f85a2545206 0x4d1566b83eccc0496001aff70ead6a5d1cb0c8ee 0x59c0f9029592e6313192d9995d4b9fbf4546caac 0x9da57c70cd0f7fa619c164bc80e88e4b9f6b09f6