ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-719FAD922B0F
|
Infrastructure Scan
ADDRESS: 0x733ca847b7235b10a14efb6f059ee7fe172f6da6
DEPLOYED: 2026-05-12 20:25:11
LAST_TX: 2026-05-13 07:57:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] System integrity check: 100% OK. Initializing scan. [NET] Connection established. Peer count: 27. [FETCH] Bytecode size: 9575 bytes. [SCAN] Running static analysis on JUMP instructions… [MEM] Stack depth: 5 / 1024. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Mocking MSG.SENDER as 0x0ad7b8c3ada1feda7b610afccd05faccea2f1f94. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Report exported to IPFS: 9ae8f78b…3a5580bf.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x4845ee0d42c1699e487a73d6120e563bae79dbcd 0x33865855947b4aafdb7db0213265387c0b3dd7a3 0x2a712774e65e0514d52e769bf9611a4588034eaf 0xb6a15c11cbda632a02c7e26743f0930a6cd16d53 0x0654750a6012bd42e06a0f1141153dc8c60f7fb1 0xf003833e2212da4d38a7b47e8b36519e9ccee437 0x4f07981db60fb5f025b55b8feb6742533dd9ee71 0x8f0cf3ae50a1d29a988c4604e61873621b51175c 0x1f91d41787f75a74e64aed5d88bb6f518a7ee849 0x550fca541635c8ce661736465a0387bdf848fcc6 0x8294805662ef896eabdc5312a8f19e4b8e52015c 0xe57d2be5c61c1f1160a9cf4be5776b2d799db733 0x4469b220ce95cfad0404ed3eb92e38115d167167 0x71b04e2947d41f4e1ec2c73eb5cfb583b052e37b 0x8a6ebf125802d5bd14b6d7a995837bf5224445d0 0x591c1a12447280911cf7d3e48e99cd2f66303095 0x061d0cede01d64ca28bf5b6a9471f1a9e5bb962e 0xc2c70b3473a4afa8e2dc293f84d7113c9b3d1db7 0x18787db89534ca8739576b18578866d36966c9b7 0x264b3d6763f2cf8bc09ed6057700dad3131c2feb