ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-362002C2D705
|
Infrastructure Scan
ADDRESS: 0x3e5bb2a724dbe9a6afe04ae7581639367693f51c
DEPLOYED: 2026-05-01 08:00:59
LAST_TX: 2026-05-06 17:13:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Core initialized. Checking license for cluster-node-8. [NET] Pulling contract state from Alchemy RPC… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Identifying function signatures (0x14da32ba). [MEM] Simulation buffer: 1024 KB allocated. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Fuzzing input data for 53 iterations. [TRACE] Bytecode segment 0x7d analysed. [VALID] Finalizing audit report for 0x3e5bb2a724dbe9a6afe04ae7581639367693f51c. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x5e51374e01d3f81d9173d18ba3abcbd540c42064 0xec1a7421499d1da22466f2c7c7a558232d1dbc67 0x68ffcef7dfdfaf70f593183c9acb88cd7887c75a 0x04e35833a31a4a248df90c862275402e671798fb 0xefbd1251a204ac9cb924fedc8475184a0f63b157 0xb025999c41731b55493bbc4ec43b3f325ea5d182 0x2b97ccf5c2cbe6653eaac1ff0dc2cb905dc19c19 0x0a89855b3a0f2811256c149a7077013919560515 0x04903708e8793b2a080fbbce1ee015cd1d9c2ac4 0x21f3ef8273948a2b188549e154294a403bdd1963 0x9ecc4b20ff30592291d994193fe109a3cce10319 0x3fec7d9de5c4ece4048faf5332752c1a649f1b20 0x453e2ec90b1a8c7b58300c541f95c0bc389d1039 0x71c9925566da822015e888c87dcbc2ef0fb1b1cf 0x40d19d66589db4009860f924bf58b86615e16c84 0xf33cc8f5d35bf18703a59dceb6f25cf850538b2a 0xd4d439c180aee26c289dc39196d1caadbea5db02 0x76996d5db37203dead157cf42bb32455d47231da 0x8c89be0709811804541678a35ca1d050364e0f84 0x0928e06e3e2b7f1737f99d336defaf7c74dfe5a8

