ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-96BB71E9FAB8
|
Infrastructure Scan
ADDRESS: 0xd817fdce276158fe2f8c35a122f5780e818cd6b1
DEPLOYED: 2026-05-02 19:43:35
LAST_TX: 2026-05-02 20:24:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Pulling contract state from Alchemy RPC… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Analyzing visibility: 6 public, 2 private methods. [MEM] Allocating stack frame for EVM simulation… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Mocking MSG.SENDER as 0x7eb3f2a8c62295287ac0076e3da6fdb764ed9d87. [TRACE] Execution path: 82% coverage. [VALID] Data integrity: SHA256 verified. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x89c3cdf5c59a09a132d55d18d02ce932179dca6a 0xe00e651815ef03c64b8c54a24b3c0ded3a6b2a8a 0x036250c1270271de4c7477bafbfa08e57a60a6c7 0x4830696ea721808c1eb066107b2bbb26997e9686 0x9695c3292e475c1a956d0fd7c79ffc4d85327e28 0xc6fb23060d552160423aa04841155df7d3cc5ccf 0xd95fc5a5d76c3cd83ad174a61e3da58b6c91a44c 0xa91388cd2bed8bc2edcda08f083d7ab1d295da7c 0x9029bc7b5c9d74ed26eaa6896062342d7bd19818 0x532274423314beebe3b74afc03ce922326269f97 0xdf6a56b1d1082d33e3a07d042298add2902d85d3 0x38c64b562ed2bbc3995914c8a1da7c9d4c422c1d 0x68905632ccb470647a4c75eb80636811024f8d10 0xce6652c383139fd01bc652cbb9a2e14b9d44e545 0xc718a18cb5eb849122345f82c002be88ce8d327e 0xa0f3782c9ebb1344e4270fde507963e9b4ffd45f 0x51d3738b5f3059f2cc56fbed2c77fd6b8b156b7c 0x46d39d9da42d344b37783c7fcc3398a2fd209fa2 0xb7ade1b4b59facf78ab88d9f31874caa74d8f934 0x93a7bc7edba3d137374cb8d158578ee020dc62ba
