2026-05-01
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-11EF8CBBD07A
|
Infrastructure Scan
ADDRESS: 0x6a4a62b77cb6b335cf08faccb4b4c19aeb6a4b27
DEPLOYED: 2026-05-01 10:42:35
LAST_TX: 2026-05-01 10:50:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Synchronizing with block height 99868. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Analyzing visibility: 6 public, 1 private methods. [MEM] Initializing storage slot tracker… [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Mocking MSG.SENDER as 0x0853aadd0186aa79731802b42a368eb6916633f2. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] No critical memory leaks during simulation. [DONE] Log signature: 7f62de94bc9c0d9b10048266227f8b1db743c0c3e2383c9da1424d3a68e7a8b4.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x2664ef1ea3263854406bce9f684b24a0c4484d59 0x2b0889fc9c846ae4c88799f63089656976248b1a 0x30a936c654ecf282b9eec2c42b0933135a170778 0x3a2f395fd47269369b90548b6791bbaae54adff2 0x5e8c83b4d9f2c251566451af881613b279110c5a 0xfce86a3ed0ba687e644fdb4d2a65022417f8547f 0x92a37a174ed8ba29a09d42e0ec575332d8b77140 0x1a3b74e135cc3ebb32d12b75bbe39a0b71c7c383 0xe328e9b94acdbf68ed01811a7bf88323a0fa2c43 0x10fc8030bad61f4df7fb93fab14f13f202ee6534 0x4ce31397660f47878a4494b300efd60a9968dd77 0x1aa257f214d7c2881612b97edeac7ec4bf39e6d0 0xdbc415eb80708802a0bd504bf848c896ef2a6049 0x4adf0b19c6a7232666f925341579cd7145f2d1e9 0xb1e85752fd1aa4dc2c1f6271141fe9d419b3ca89 0xfaf012ba4f1f88482e14b8ca990b57776a308728 0x0def16671fd0fec2b1bab47a34c1a671d169effa 0x171297d0536452e1f08bcc9d3f06b6e43e45cc07 0xfaa47d55b3e4e1ae7215be39387a32b1894b3cb3 0xe9071ba286345ad9e49f5a3545b1528bd7f9a4c6