ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-15DCD526D692
|
Infrastructure Scan
ADDRESS: 0x814afd26a67b0c3926635aae5827c6608b79802f
DEPLOYED: 2026-04-29 13:57:35
LAST_TX: 2026-04-30 17:14:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Fetching raw bytecode for 0x814afd26a67b0c3926635aae5827c6608b79802f… [FETCH] Entry point found at offset 0x794f. [SCAN] Running static analysis on JUMP instructions… [MEM] Snapshotting EVM state before execution… [VULN] Warning: IS_DEBUG_MODE found in storage slot 55. [SIM] Reverting transaction at PC: 7893… [TRACE] Stack trace saved to /logs/TRD-6D3BD793.log. [VALID] Consensus reached on node cluster: 8/10. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x77bffca4b837fb839234450feb682ef6a0e78550 0x4672d569a940293e764a5f8a322265018b4d3e62 0xd71355c98155a2322f7341bf995012d0e8703589 0x49dd3430244654d2fbac34c455733214920d759e 0x1a386b48f0682f56ba6c2de8eeee0a6e37f29a7d 0x2bed5e5648de042dd9b7fa843dd9b2ec92d59864 0x8eb268069d767298c51f49a28c3639fb156c7d8c 0x2fa19bd16e18f9e21b2508f6acafa672f94ab019 0xe44dcf74ab26ec2e23c4f0922dcb9765379f0aae 0x871b2814a2267a1b5fb1da45e1d3e1ff12b8df64 0x257fc647f141672f52ae8b2f1b9afd58df3f2c6f 0x272dd615143ba58a3ff7e24484cee53bb8cf3fe0 0xb57d72d038980b601b251b3afb0ae6aae192f9cd 0x2780c9ed1c54e62b2b3c2b916fe7a070de9990f6 0xfacfb55b7e1c5b2afb968cb4cd52265ea6252d3d 0x42498fb605201078867125e1782701bd20abe207 0x43f1e5189968322ea0e95ec07479bdc80812b1bf 0x6490fb70434e57d29cf7bf4cb38b13ce512e6ef1 0xdff836c5f27e8d314d1e5055d33e70918c3a0f96 0x7efaaacf4e88ca129539e50e3216d80b9325c4cc
