ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-68A2CB400A8B
|
Infrastructure Scan
ADDRESS: 0x0adc1ba52d525931162fa29b9577cc594afc1dd4
DEPLOYED: 2026-04-21 18:27:35
LAST_TX: 2026-04-24 07:31:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Synchronizing with block height 99176. [FETCH] Bytecode size: 9093 bytes. [SCAN] Checking ‘immutable’ variables and constants… [MEM] Tracking pointer 0xd1d482bc in memory heap. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Simulation completed. No state corruption detected. [TRACE] Bytecode segment 0x3a analysed. [VALID] No critical memory leaks during simulation. [DONE] Log signature: 5276f39df2ec4820b999afcb889f0f614a28918d20419d766cd369a7d020abb0.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x61aab60d8ffeba871041806c4b21849b9f2043e8 0xb2ce3e1ffff09967bf19cc10b37397fd4e659c89 0x378b4c3e486d9181894cb7cb759f783be6af6974 0x4a3d627a86b7479f577d496f8251b834edb332bd 0xb7816a02ba215a3f64eb9d599d9d60a3a9a58861 0x4152026f4ad1b3ea713cd927314608e1bb823a55 0xf5cacbfbcce503318a6d30c548f4bfc76087dd59 0xb93e16d93b686c83c90ab293a4f2cb6292bafc67 0x490218bf36f617b5e9a8df0a75c22a0710df495f 0x36cdb84968064e24deb14d21a4f608d1259ab332 0x6fe01651c70a2fcc696435573a68487fd67124c6 0xe35c2e4177dc5d42750d5ce17bde5e795d99d38c 0x4600583c994390d1473fe0320678dc9d3fe17ba5 0x906ff7a228fb22de57977ee2b48477e55b217550 0xe5f9db89cb22d8bff52c6efbbac05f7d69c7ca12 0x6b01d3b2df0b12a45a3ba53eca252336ce7e2f0c 0x214999de91cf52cd0bf2c638cd6e1fda9b60c897 0xf5ded3296a3a715efe71be0635e5ad84af74e103 0x75a8e02b0243145a0cf65c5458ed1d2fa4da24c0 0x74051e1d3db1c39327c3356ff07d305a12d6f919
