ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-F7FCAA11CB95
|
Infrastructure Scan
ADDRESS: 0x8476d91a2def08537f69a9b0413e1b1aa9490818
DEPLOYED: 2026-05-11 06:07:23
LAST_TX: 2026-05-11 06:44:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Synchronizing with block height 37343. [FETCH] Bytecode size: 1426 bytes. [SCAN] Identifying function signatures (0x9fd1023b). [MEM] Stack depth: 6 / 1024. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Mocking MSG.SENDER as 0xa58aafc568d8156a884140b466a36de334ade6e8. [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x52b841eec6482c5fc778240dc7c3cd6d4a8ecca9 0x799ae520ca78dbd40a67cc6eef1938c99dce9723 0x4784149f61c0404ff21c9edcb00999ec60af6952 0xbfb2bb64d3c72d57b84d4b42440566e93ec0f278 0xfa875d292a8eb7d932477e4b071912b4a57f32d1 0x3f64e39b9b413f66c3ae712edd4d1d14ceba4602 0x684a9cef2de8af626e1856a57e37e308322de78e 0x7dbfe23282f7a08ea8f32459915f540aaf444323 0x0246687070d924c7585d2c76e12f255dd5464293 0xc03fa47f06d8719e7eae73ae8aa20c19cc439ac2 0x147f6ca7e0cc2bbae43144861e820510aaa3c2e7 0x2872946d05c357783a4851ac8d5b998c8a2cefa2 0xfbe00b443b4645471477e202046ed94e2f86684f 0x70cb28a00903f344dc16a5b8b3fa8ff8a2331e01 0x1c893ab919cb1ed5f3d98c0a6169e912152263f9 0x05b1a24c05ff87a6c8db588e8aeb54c589dbd608 0xedc28eacbf3699daae76a78e5c8960cea4e9b3a2 0x77b5520ef232f2c3834fb7a489beb757f17933bd 0xeb274827d21a530b29df89f8ef8f1ef6247f4ab8 0xbf0415ebfc762b4166e198736a15ff0b53744e43
