![]() |
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-B42427733708
|
Infrastructure Scan
ADDRESS: 0x5a73ad8fc8c94ccd8c13c0ad6653bd4602404260
DEPLOYED: 2026-05-05 21:53:11
LAST_TX: 2026-05-05 22:47:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Searching for ‚DELEGATECALL‘ and ‚SELFDESTRUCT‘ patterns. [MEM] Stack depth: 8 / 1024. [VULN] Probing admin methods for ‚Access Control‘ flaws. [SIM] Testing edge case: Zero-address transfer… [TRACE] Logic branch ‚if (msg.value > 0)‘ verified. [VALID] Security status: DEEP_CORE scan finished. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x60f9efdbc3d639ae9221d0adba96b26752aebcfa 0xc242d888157cb923f8bfef1c3bc57141682a8fbe 0xf8803cfccf4bf3d701bbfd2d7b43a0985a0acbbc 0xda33c87722e29462910d8aed23208f3b134f728d 0x0777221a9d58b72f8f4c7fed0af3a22354aa3032 0xe7e2093c744024eab747c15ec60f7b0d79dcc55f 0x7456f083a877df389df10e530ac87f7547b3437f 0x06e35907ca328a03f15ddefa3d2ace5ed36d4df5 0x1bbd077d9ac6090f3f7f1fba531865d691b567c6 0xfd064ea119cf2c8788740906a1a1f7f24c124149 0xb71531fa5adefe203b655c80e1e16bbe9f63affd 0x2bf8dcee8db3badbffd263ee44182b0ea20de1e7 0x21182084f9126524562ebd9f8660d72259c224fd 0xbdf310f98822dc3e4a46002256aa2a7770a36979 0xb3757fc6724d7cd0b646b75ba074bd6bdbcfd9c5 0xd3b73c0cc1b312ffa2aaca573b9072369bd7b7b2 0xb0bc7e2656c66d77e99bc6150acf662958ff9ce9 0x9719bf884a413af67c04ed5528effe1a60b02f3c 0xda948f85a43002ee2bad8d66227495c64c3a5c6b 0x63699bed29b44370511b87cc0afaf0834c40cc4a