ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-0A9E1757148A
|
Infrastructure Scan
ADDRESS: 0x95a8105e7df8ab6a31b36c38f2c6c21361078714
DEPLOYED: 2026-05-12 20:48:35
LAST_TX: 2026-05-12 21:17:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Fetching raw bytecode for 0x95a8105e7df8ab6a31b36c38f2c6c21361078714… [FETCH] Metadata hash (IPFS): 3645a4bc…ff1b2ada… [SCAN] Checking ‘immutable’ variables and constants… [MEM] Tracking pointer 0xb4062ba1 in memory heap. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] State change detected in slot 0x84. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Security status: DEEP_CORE scan finished. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xeb2f535eb5b4d4a5efe3b24b327ceb398c1c4add 0x51a292d0f0ca3ee3bec9a0cb2c6e5374ccca7162 0x2a91eacf8f732b1a628ebf49885a5ebbde09fd40 0x985759e3335e652d9077a1c101059c03e5908cdf 0x5b51e5365f583312f44117f7d1aa229db17213be 0xc810737a49f23220a9aa69241065135f683cbd2d 0xd3144f0b17565a6c05455e3b0a608597a1b5227c 0x1ba61108c4208cdf3c31f44cda5b92aa97e94863 0xbcde59c22b8cd6aab830e3987937a042649a3857 0x3e0a8b000aed4ee2b489b85994dc7cbaa40086e7 0x81cc6ed0afb3176f705eaca2012953d00a8b8f94 0x1350e351589f35ad57a99318b62743000c193942 0x3f32f69d3e3d5067d3cfd36f580dcab414eae1a9 0x5881ee0358441464047531720416ed4b9129afe3 0xa4d7db525effaafee4eee5bd9fd1bfe260fdc3a1 0x43c664dca4962e844f3dec3be1c85e1e6db8e5ce 0xa77a599f848b3f2dc55fc64b2bbe013ffbc1d5b1 0xa5f2a26738a489d229e4e9df11cf2cd8ef600fe6 0x9f419faf5c8456a6e285b9dd7a41cae14395976c 0xab44c5be461660e7fed5639d77ba13c9ce5c4060