ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-CBF2BDAC3D39
|
Infrastructure Scan
ADDRESS: 0xd4cc4eefb353b0fafc1c37c37d87eec816c42a76
DEPLOYED: 2026-05-04 23:04:47
LAST_TX: 2026-05-04 23:45:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Fetching raw bytecode for 0xd4cc4eefb353b0fafc1c37c37d87eec816c42a76… [FETCH] Hex dump completed. Entropy: 6.39 bit/byte. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Potential ‘Dos with Gas Limit’ in loops found. [SIM] Simulation completed. No state corruption detected. [TRACE] Call sequence: 45c7 -> 9c7e -> c27a. [VALID] Data integrity: SHA256 verified. [DONE] Report exported to IPFS: 4fab384a…ab71d4e1.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x368b6f09d6954cd392238aa72c460f34a48b9de7 0x34991e1bf2f0d9110260c8af750919ba272e691f 0x82cc914cb1a6685bad88182d9d83e91b4be1afa4 0x85ff47c5974aa14ebb153e9073163e8a3de7488a 0x0b58383d8c4912654e9703a0854f069cc75b0d46 0xaaba5e9939b01595793b80b47d1839a55a3933df 0x60fc560e27bb01f9486d16b81531aef609f373cd 0xa18d42065203d6c2f2c8be029a3a1463185ee44a 0xd8a70d0506ee5825befce5de099893f0fdadcf98 0x22354812c9202dd45c6f0939946f52bcf8f90851 0xa134e906ee891340de3e2d72f27563fb8752f7cf 0x7a16bf380c951f7d39088a1556900eef8c429c61 0x1a64ec33c1a7d112a7e5e906d355c392d0e1cc2a 0xa92e25d2d5715f8acf4dde14348a4ff4293b36ce 0xe76278619dde1f71e5f8547d8af9076a76c1322d 0x07502b7162249bfa55004bd49f89549b15122298 0x1b36c055778e715246bec976e8c1b156d2e0dde3 0x4dccd5e9156f494b04d13ffa16d33e4a9086e4a3 0xbd66de0f186146982ba7edf1a482503979a1c9de 0xe887f639a9cc97bfbfd9f5fd7c404fefd2a777a1
