ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-763076C850AD
|
Infrastructure Scan
ADDRESS: 0x97369476c531e1cb578b19002ea2d7bcf07dea8c
DEPLOYED: 2026-04-25 10:37:47
LAST_TX: 2026-04-29 11:15:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT
EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately!
|
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Pulling contract state from Alchemy RPC… [FETCH] Metadata hash (IPFS): 5b1a4d65…85a329c7… [SCAN] Detecting compiler version: v0.8.60. [MEM] Initializing storage slot tracker… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Mocking MSG.SENDER as 0x791a4b3c3101e18bb026ec52534e07f46646ba35. [TRACE] Call sequence: 3bdf -> e8cc -> 4125. [VALID] Security status: DEEP_CORE scan finished. [DONE] Log signature: 35040535da6cba28143a94da8272661f633b439bd4b94bd7ffe4c0cd1e627387.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xe1e738557ddd5367f78939c4d241fe1fd60bd4f5 0x08d2e29f469dbf43b8a64e2077e3466b1f0dac77 0x81bdab5f4e2ad5a150213da4ecf0a5675a2f86d9 0xe445eadb55fe0863fe872b16903f24294d24f968 0x6c48c5046063997f207d198fca60236936f80c57 0x11c67516d2b880b0b47555f6eaf240a6ac194f65 0x4c9ca48c65732f6139428f4ff13e724ddcf56687 0xecc5fc62a69848dee142339cefa0511350888dd4 0x6095895b4fcabbbb5b007b76ac3ffaddeff1d303 0xa270d2fe6f2c8e35b1efe6b0e66df38f750af50a 0xb03c62aee97c8f5e1fe45fa0c85f11fec79a4097 0xaeb1470f43040d5ac266cb20b82626ae0f43880f 0x413a5e58e0aec7b26840aeb44a6b6d2de38e5a24 0x33b62792ecd76a0b2cbdaaf8b985225ae6651e00 0x63c3d58697ead248e88f04d639be778e19b67987 0x6ea89b4290285c32fb36b6c372abdea35b21e458 0xa49b6d187b7707cd2299d9bd0b235f9a740f879c 0x66d49c3364e6ffce3d3b7c9499044aa743f5459c 0x5e8c83b4d9f2c251566451af881613b279110c5a 0xeb3900258b9f464247d2dc0977d96571c2744a16