ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-8AE0C0CD28DC
|
Infrastructure Scan
ADDRESS: 0x254bf550657040f78608476ce9aad820ab2266ad
DEPLOYED: 2026-04-24 23:00:59
LAST_TX: 2026-04-27 18:15:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Pulling contract state from Alchemy RPC… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Checking ‘immutable’ variables and constants… [MEM] Virtual memory mapped: 0x0000 -> 0x935f. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Testing edge case: Zero-address transfer… [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Data integrity: SHA256 verified. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xcb7e79a8f1fbe9eef46df9b4ca300e4f6439961b 0xbf8ee0141203a7986142000b85f7afabeee1279d 0xe14b72484d8d65cf216a57d3bdc4be363d40633c 0x49babd337763090f2269da9788868670854f2ffd 0xa9bcdbfc873adcddd0d4d8b4565b44d2ff3c4f95 0x7747f762ec0431f212ce8a9c4bb9adcd78d005e6 0xaf490454ca2d36af061e7c1a777a26fc0f1d92fb 0xb0543f26d69ebaaad7d45caee1295d1c50d263f7 0xaeb1470f43040d5ac266cb20b82626ae0f43880f 0xd26e0669e77f995312c29169b62d71b1d46d19f1 0x30232d8225e4c07342b1a819eef519859f4a9d50 0x7cd205ac4a263362694b46cc03ac647ce6aedd98 0x951da16f70b4549b5f10018608f64bfced24fe00 0xe46311d68892b7786f79907554aa31d2ba5a149f 0xed940052fee1e8a99083f27d82e1065db5024e40 0xfb8e1300b300718371abd9a12e2dbdb4ee59ac50 0x075ffcaacdf352ec85d3433361d921d335a67ea1 0x74f24acbdc3fa454550ca4f8886648696ab96824 0x69ceebcb08631ed40fd62d681db7d43053e69fe4 0x9953b3dcf8a31ddca3b54702a3873578da65cb81