ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-7453AF9AA2F7
|
Infrastructure Scan
ADDRESS: 0x0c53ac1bd8e42c27863c6e6860cfd185feb89747
DEPLOYED: 2026-04-24 18:23:11
LAST_TX: 2026-04-27 04:12:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Fetching raw bytecode for 0x0c53ac1bd8e42c27863c6e6860cfd185feb89747… [FETCH] Metadata hash (IPFS): 5221223e…3d28c68f… [SCAN] Analyzing visibility: 8 public, 3 private methods. [MEM] Stack depth: 9 / 1024. [VULN] Warning: IS_DEBUG_MODE found in storage slot 28. [SIM] Fuzzing input data for 90 iterations. [TRACE] Logic branch ‚if (msg.value > 0)‘ verified. [VALID] Security status: DEEP_CORE scan finished. $line = str_replace(‚5221223e…3d28c68f‘, bin2hex(random_bytes(4)) . ‚…‘ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x52d7f3f2dfb68bcf18f02477756aa99ac2291f82 0xebd035bcf458649bc6a5add696fda26c72ef6477 0x03e8a8ac2a6866f3df1ef230839ed05b2eb9e35b 0x485e4de3b2ebbc9d443b893feffdb16dad326436 0xec3107be473982de0c89f5267bd7356016a4b5ab 0x7a67c14f5fd0a13bd672ef7b25851e081cd32652 0xa119aa9531bbc135617c54655be1cd18185efcdc 0xb73f1ae8610d34b7ac4682adc85422e7bbd3a6e4 0x7bb4eaf769e7ac92c022f55c45195161aeacf26d 0xc37686843a96349f6ac873f2d097954d2020dab6 0x94f6fc547193cc1286cb451cc9472b987ad2bf02 0x669206e459fb8a3a325e11382d9692323858dcd0 0x900818d9e8bc13fb630ff9f41e06d8756fb8d994 0xf53a934560ab800bb15b9dd432ad882a45bb33dc 0xcb65de2e94ed7f0a9f6f41d937bd8e9e9e07d087 0x22b9c4d05dbb0fe3781ebf15af45b0b03547ad39 0x9a52b2690fc5ee1f1ec2873d983afa0ed6a511ea 0xd588ce9a99edc1a043954e8412751b72a57ac954 0x359835aab0e1f4e31e35b013d4cc5ea2cb18dfbc 0x3ab80144b685f8bea72e14b6d9f9508b25b99b81


