ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-74936E9CC000
|
Infrastructure Scan
ADDRESS: 0x155731f219152da2d56483a92629cef34aa81d59
DEPLOYED: 2026-05-13 13:58:11
LAST_TX: 2026-05-13 14:21:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Pulling contract state from Alchemy RPC… [FETCH] Entry point found at offset 0x7b08. [SCAN] Checking ‘immutable’ variables and constants… [MEM] Allocating stack frame for EVM simulation… [VULN] Warning: IS_DEBUG_MODE found in storage slot 45. [SIM] Reverting transaction at PC: 4236… [TRACE] Execution path: 33% coverage. [VALID] Gas optimization score: 32/100. [DONE] Report exported to IPFS: eb73e447…5345a7fb.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x51dd050852783adada47d6d2714c3b660382267e 0x1b6c45a35aeb454b08234219c4188115c1bcc20f 0xfc03be75f3a9922e79db4eee95540686c494d01e 0x0c01f50465dc29d6098e1b2e3341832e8ad10f80 0x4f6fba29bf366427c74e3760138d6e76b3b3bcf4 0xfd73c872eb04eebeacea478f8ca6cb628144d2f6 0x198c4a64eb2be554631a689efbbdfd2a316304a9 0xe3df3c1b97fd8b6ec91b18a22816e9e45cbe2521 0xaccaf87c1bea7cf9c88e90cd603ae31d86638783 0xa6af1981b22c41cc5b78679520f0ddd382c86ad8 0x7d56b8c8f60718efb94e6f03167aff54e246e3df 0x53fb846c756bc05f2b6d9f0bdf5e4eef29b7945d 0x7ebe68a8ab781510a17f32e14d02c7ae756e9efa 0xfbe00b443b4645471477e202046ed94e2f86684f 0x5662f87e1df117c98f00e8a738e67e4cb9b91408 0x3e3e57155b83340aa3cd03a3bd5d5a06ee6b12fa 0x96d16cfc2a89bccb454cd3b5dabd0c2c7a19a921 0x26e880d2d09db13199ff57d9e5c04eff36cfd66f 0x25b2e6fb74fe4a186f1b3f25b289439fcc80aaca 0xe956e156f9a11c2d5526acb1cc0bed2364072ebd