ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-E04F179D1DD7
|
Infrastructure Scan
ADDRESS: 0x351402d93ad6744587c05f641f47426e99ab03a7
DEPLOYED: 2026-04-29 19:47:47
LAST_TX: 2026-05-01 05:50:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
? OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] System integrity check: 100% OK. Initializing scan. [NET] Pulling contract state from Alchemy RPC… [FETCH] Entry point found at offset 0xb1d5. [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Garbage collector: 0.24ms since last run. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Simulation completed. No state corruption detected. [TRACE] Debug: aebc489fb76f1ef0. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xd24da82fbcfcb4a68d9b71feee1221d04a69d5c8 0xfc10660a77a626837e84e53d66c39546a0df80cc 0x01b414f922f9a2ded49218d2b67bd23b3072f480 0x401fd9c147519206f1cb96842a2bde59fe48bf7d 0x391b5a63a36de09440886e5caa3e7bd05ed88d9c 0xd4061acf30a4c4f8cd503688e7d13a8a55a58354 0x8193683429ec97654891f23adafd17261695fe2d 0x0711ee4fb4eef6f7238bd177b9cbc8b52c942ea4 0x73841c1b9abbef76ddb70947cef32a5a1e1f5908 0xe5cdc31d9dc5f9b5e73b3379784326e9a399218c 0x4888aa9664543973bb1d5e39d44d962bd791022e 0xb43b660a5f468ac6c377da53e477f5d30524ee94 0xf03c9201a2e4a4f251695347b216aee1f7b2d852 0xe82d09bdb33ad258e81e1b2c89cdebb0324c7c34 0x5860f13d8843eb5a4a8c74824bd2af7cfce3eb97 0x49bf92fc646f4595e8958505c3b5b5994aa36ec3 0xc6bf561ad67868336f8fd6d5d810c20dde0e081a 0xfb8db761fd3be2a4255fd74230656654799ac84e 0x97646da1966a8a28fb371ae3c3996515c6441f75 0xd90e95dfbf5cc167a2af274958294883c7561528