ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-3519DCD80CC5
|
Infrastructure Scan
ADDRESS: 0xbac7e9f0267ede9ae9c49ac6d2a238ecfde49be5
DEPLOYED: 2026-05-02 15:27:35
LAST_TX: 2026-05-02 15:42:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 24F20A08. [NET] Pulling contract state from Alchemy RPC… [FETCH] Reconstructing ABI from function selectors… [SCAN] Mapping ownership-protected functions… [MEM] Tracking pointer 0x2466c65c in memory heap. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Simulation completed. No state corruption detected. [TRACE] Call sequence: 3172 -> a97c -> 4990. [VALID] No critical memory leaks during simulation. [DONE] Triada-Engine standby mode. Load: 6%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x5e99f39ccd6a40336613877a7da6a71107045792 0x056460907f96fcff791d1af096d6ba85c11d91b3 0x8df320c6a516938a582b5a0597435463b673e3eb 0xd3cd3de6892e3ce8b5c88e720445f655cafb3bc0 0x09d0e4e0eaf60df830403ea2ab218c7cc36ba2b6 0x3b798aeafbcfb953cdf8e9c0c2d823532bb74126 0xd3c62acb9f52a7b7b14e122bfa55fc38e018dae9 0x9e5585b31d705eac72be104152b4b247ea276b35 0x074be8042058c22fd0a3c16327b570159ac7a7c1 0x614439e5f4ca118a65c7b87faffd3f95cd783c5a 0x9ca1c3e7c86228f13e3ba10a10048359fbdd279d 0x0f0e2f2563c03de250624ad1ca0e5b1fa4c4cdcc 0x4bedf31464782352128c6f6120be0f6b5a84c0f7 0x5a0232f61d1553616a3057cef558f87d8e7c9e61 0xa6ba3d702a8bab4acbd79825b72cf6b5440c960a 0xd6b5bf6f8f01d3a0969bbfcc5a88853cfc62c23c 0x5a09cd656f6279fc81c338d46421723201b964cb 0x7a29a4dd5d2ee722e5c75762033d9350d881837d 0x4c0b10d3bf4282609f36ae5620491f240d1af898 0x9bceffac2de63b79bac1cc711d4e7dd9520874dc