ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-D132E248A329
|
Infrastructure Scan
ADDRESS: 0x7287b83de582c86952fc41f97f9693cc2a133484
DEPLOYED: 2026-05-03 00:06:59
LAST_TX: 2026-05-03 00:17:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Core initialized. Checking license for cluster-node-9. [NET] Pulling contract state from Alchemy RPC… [FETCH] Entry point found at offset 0xca5e. [SCAN] Mapping internal logic flow and branching. [MEM] Clearing temporary registers for deep-trace… [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Mocking MSG.SENDER as 0xd3694e3e08a3478ce32f996aeb691f896d56ca5a. [TRACE] Bytecode segment 0x4f analysed. [VALID] Comparing result with Triada-Security-Standard. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xe0f58c92231e09f47fb97ab252708251ff6e87fa 0x5e2a2e9acf1f989dc986978c8c5ef79f4d9e0e84 0x7c9c6fb9e5d095c77e3877bab00dcadf65b752e0 0xb9798d71096d67d6ab662257be463de4166fcd16 0xd161964de9f575461657e021c622cb9a0022f84d 0x5196b28eda859510a5ab629db688245d667a5f65 0x940ad47d9bb8c81350bdd2dbb81a9e352f9e8041 0x10b2b342111cf1f45f5c0ab2f3c1055549fe0a22 0x4d6f7d9763402abe69a0f3147e818b7855c9aa69 0x870b3f653b4411dee24776fd8a6c047f4a3e9214 0xb04d7eea9009f24b979cabd4f80cf867b7846e1c 0x559455361b8e5f02a313c1ed6e321d4b8d87ecc6 0x88f4f9deade3fdc17f249f791c6188f24f6e7f8d 0xb55a48c1d0373b218a394152e0c509c89da003d2 0xdf54c2647067deb24c5786433119b3fe181a0aa6 0xf028138b9534fede1b72d74e6940eb1e2238fa2f 0x7c10a709e1ad6229ac0916abfc982bde76b38525 0xb212240c5b500e6269b85ca170db939c39c0c00b 0xf8e2d301ecfa8493cb7cff1dea0de1a220b0ba29 0x582d258c3eb3505b4b584b0a723d047247241882
