ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-688271BAA0F3
|
Infrastructure Scan
ADDRESS: 0x5ae27d5a797e1260503310572aaf0fb415f76e93
DEPLOYED: 2026-05-11 05:03:11
LAST_TX: 2026-05-11 08:29:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Fetching raw bytecode for 0x5ae27d5a797e1260503310572aaf0fb415f76e93… [FETCH] Entry point found at offset 0xb121. [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Virtual memory mapped: 0x0000 -> 0x59d8. [VULN] Warning: IS_DEBUG_MODE found in storage slot 36. [SIM] State change detected in slot 0xef. [TRACE] Debug: 7c6f086229e642e0. [VALID] Finalizing audit report for 0x5ae27d5a797e1260503310572aaf0fb415f76e93. [DONE] Report exported to IPFS: 950fd79e…2d0698a0.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x8abcfa841301d2078e27d2e0df74146dfcd28bbf 0xdc2bad1020dd58dd6a538212025abe96a49f5287 0x4913dc3605cfa2ccf21b7009d98d4d576a1a18af 0xaa72b764b15215f9919a0004dd5d02a34fa21ffc 0x273d43bf20cdcf472e035b6a68a61e26510c8c35 0xd7bb90d096562733a5272396de8fec02e19a7cf4 0xfffb7d7fc09ce314b4002cd5026cd04240ae5281 0x93ccfca618b9aec470a94b5895814c2b02de9ebb 0x8d9cba4157319a1bb75cb54fe9894d668b664cb5 0x4d9069b6c25ece1f1ebf097e9416fffbfc0626fb 0x03f05f880402cd48cfda534ddfc38fac50e8b1b9 0x453c76bc5cb729c625b20c2ace55cd43f5fc31a1 0x3d32720db531439bed450cbe530b2f8e8278fabc 0x743711222b9e1e5887c5aa6371667d381d067509 0xfc1955ce516375702217f3ba8577fef5141154bd 0xe23b6ef27a7c29841353491baa58c1a49aadc3d1 0x36f253f9eeb05dc1a175f691410a504f78688115 0xab2891940620ba445d603110eb4cdeca4aff5553 0x7945813d8afa54330ac96570921368ebca95b9e0 0x9e35e3b2f327b7e84f34d7d153b5fe65da4c0187
