ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-0A53CAF6032E
|
Infrastructure Scan
ADDRESS: 0xca6d487a5cbe458b88f52291ee76c26b3aad2845
DEPLOYED: 2026-04-20 15:42:23
LAST_TX: 2026-04-25 12:48:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Core initialized. Checking license for cluster-node-2. [NET] Pulling contract state from Alchemy RPC… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Mapping internal logic flow and branching. [MEM] Snapshotting EVM state before execution… [VULN] Investigating ‚Unchecked low-level calls’… [SIM] Mocking MSG.SENDER as 0x16072a9066ff3f785ea867270ef40e44217d2256. [TRACE] Bytecode segment 0xed analysed. [VALID] Generating cryptographic proof of scan… [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xf4aafa6e9fbbec6a2402f05ca9e935ee50f7312c 0x509e9f7b4c9f744450f43e1be64b246af08c2f15 0x5927c58882119f51d8357251835b457901a70298 0xc03799b635c9328b8a2d596b1441e6a61fea3667 0x119b86d25c1a55277c7e4cbb4087f18217472b3f 0x230f0b2e321d0e32ea50696710a98ca84503a391 0x9b9c063ac75fc4b6300315e197455493414c190f 0x22f05515497ce8d78f3898088c474403ac9c668f 0x731fdae025e8a4ca8b8e75ac13423487976f2751 0x3d169e3fef7a39286b17517ab23e779811d9ce7e 0x547567c5dbe1bef46ec9cad6eeef9705684be42d 0x29cb23a10115433248625ea8f7b1808dbb30968d 0x0de8f2cb6b4fd5df71bb5d39a488bdcb54e36490 0x79f7c80633577dd23053335b7a6223d2d3f1e0ea 0x471bcb0286297c18dc61f7efd343fa487bb8196b 0x33b310cb754fa9532f593c0b0cdfdac79d62d544 0x37b91a5a4e4732c8f2b41393dc2e11fcd7e48dbe 0x2a3fbad692b060b9ac642550d5f41feb54661ad1 0x274554a66bf5ad670ab48d5ab26dbed7ef847999 0xf32f044a761e35a51df03d80277fc7a90f804578
