ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-F256FF63D8C6
|
Infrastructure Scan
ADDRESS: 0x3db5937d2a0b17a234fde3e18d1be5b875689d3d
DEPLOYED: 2026-04-20 15:55:23
LAST_TX: 2026-04-26 02:59:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: D6CCCAD2. [NET] Connection established. Peer count: 12. [FETCH] Reconstructing ABI from function selectors… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Allocating stack frame for EVM simulation… [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Mocking MSG.SENDER as 0x94e15a2da2b0759a663d1efdfdd5e6969f7ec6ef. [TRACE] Stack trace saved to /logs/TRD-BD7F7BFD.log. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Disconnecting from Ethereum node…
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x5d7aeb00e6b4ebd559db027f297e2fc572728189 0x2e06221c2d2a2e02f4edcc9f4fcaac47b9bf5075 0x92a40c6fea2f5e111b561b3a6d980d80142a0a13 0xb9c3644727789edea8a6c0baee6f5b5f1649b70d 0xf40251aa27dbbab41db155346828442255b03e8d 0x7aa917d1801cfeff8be2ae80ab36cd00d07826b4 0xd67703d070de7f97aa38728e46acd6b8bd8177eb 0x9b955d6c28fc4db402a793e137911d1937ff8e01 0x7e619b7c8ca095e397db1651da2d9c044f8fa69c 0xd121b01b1dbb14cef5c68adc048aed9c89abec06 0x174da059d22a4fa5c6efd8cbf5d5df14835bf8ff 0xdea02e638eed30bad417298dcf7354973dd1225b 0x32e2be371e99df882602926772280e95ee81c8af 0xc415b16e982b537c6fa61854b26b666447c2efa5 0xb6e10da9faaf8a1e4ac7fb20386a0a8abc388fd6 0xbef3624a37d892b58c07ae790051e1ed8f5058c7 0x291a193c35293ecd1c315b5ef319bc05eec3eb94 0x55ed83cc64bb5e7cb34d5fa79b9eda0da6eb9aa4 0x4fbf35575934431acf3b06b627176983f24c59c5 0x74ad005710c6eff76044905f16755fad6ed3ef3a