ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-87AA7CF6E067
|
Infrastructure Scan
ADDRESS: 0x5aa4742fd137660238f465ba12c2c0220a256203
DEPLOYED: 2026-05-01 13:51:11
LAST_TX: 2026-05-01 17:56:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Fetching raw bytecode for 0x5aa4742fd137660238f465ba12c2c0220a256203… [FETCH] Entry point found at offset 0xa962. [SCAN] Identifying function signatures (0xc61ae8d9). [MEM] Tracking pointer 0xa6e3cfe1 in memory heap. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Fuzzing input data for 32 iterations. [TRACE] Program Counter (PC) synchronized at 9343. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Report exported to IPFS: 1dc927c5…40466106.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x032bc068837753df362226a61dc9ea99d85e4589 0xbfaf5604cb98cdaa7543d62e25666c67f82bff36 0x509230d98e8cdd8c4a0b7263da3372c66814e8f2 0xb4621df93c9c929adfb8f3e36a1d915b3368f4f5 0xce58f34a930c3a3e23cfaa42f152d9530878ada4 0xa54b3a9c499d05215d30183f79569bdafacece68 0x8f1fd3a20b256a845237bcac9f6b8f2fe1aa0697 0x854b7998f0675a565f78ca441b19eb59256f839f 0x056f719731e1f6e4ae8539f7356fe5e727998d35 0xc6c523f9f3ff5136cb4c14bbc59407779162a7dc 0xf7d2ff4c7827319f646f82eae71cd9dfd11c4e92 0x684733dd5b2af8067f93974ec7efe590db5491e1 0x9ff81e34973317a889fe83f514c8cc9ee9dcdec3 0x07047cacf0d5d264dbb02615f072619694062ee3 0xcc74a9021890944130bece47212be6dde246b624 0x918df18bcc906b21e148b3194bddf75932dcba4e 0x72599a6106f86496a4650c622c689cebb6251b08 0x5c0e2680246fe6e60db38c42c1439d33dabe9b2b 0x864b48a38889fa39bbcc26e248f5e5592a62cb49 0x1d22e76631acc4f0d49e6eabefb261db45a92bea