ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-B101E8B0D6EF
|
Infrastructure Scan
ADDRESS: 0x4a5be50ce924835c011949f9d696717295a08494
DEPLOYED: 2026-04-26 18:25:23
LAST_TX: 2026-04-26 19:04:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Pulling contract state from Alchemy RPC… [FETCH] Bytecode size: 4702 bytes. [SCAN] Analyzing visibility: 7 public, 5 private methods. [MEM] Garbage collector: 0.54ms since last run. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Verifying ‘require’ statements integrity. [TRACE] Bytecode segment 0x28 analysed. [VALID] Comparing result with Triada-Security-Standard. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x488d91c47e2182d4f67d5bd073e7def8081c160c 0xab4a50d0980d94d8a934727b4ff5b74607d144f8 0xcd6a25316cff718049a1da39ce33e10a87c5eef8 0x3ab015730f5a11b4f8fe7cd5bdaf82fd02e9f061 0xcbd1153cec5fe9726ea04ba97765ff400adb8dc4 0xd20bd1b21b47b82761c8ee02263ffd235e1b0ddf 0x670f6c2a8fdc14021e3e2a8297522d8c685da546 0x885d09889918ed667735d147cdfdf8b39744d906 0xf568b84761f01d770ca9369c8c3518e23ff6b23f 0x38e6c83c0717609d9c2a07f65f0cd7cbb9a29793 0x616af703d5739f2122af48c0d1ce0b37e09381ac 0xbfd73d717b875ffe413a1c78f7de63bb32de975d 0x5d70ff81321a6e73f5af78f147e27cdb096e264a 0x969fed827942d474f5dae4263b6c9dac0d155a53 0xb57118976901ad051e38ca57adcda236c7b2e08a 0xdd83b40c1577cb49a0dad12897bd289a3effadf5 0x3c0d5caa9e11580d5c91c86cda57e1961a02b989 0x50ecfed09fd75862e61097be2bc4175385fc2e46 0xb35f2ee104202bcc81c0197bde2dc6b25feafd8b 0xe94de02e52eaf9f0f6bf7f16e4927fcbc2c09bc7
