ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-E908541F8651
|
Infrastructure Scan
ADDRESS: 0xe52047b42a23b0878c4890dc11912399623f95b6
DEPLOYED: 2026-04-28 23:20:11
LAST_TX: 2026-04-29 14:22:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Fetching raw bytecode for 0xe52047b42a23b0878c4890dc11912399623f95b6… [FETCH] Entry point found at offset 0x491d. [SCAN] Identifying function signatures (0x4c80d1ef). [MEM] Stack depth: 8 / 1024. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Reverting transaction at PC: 1368… [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] No critical memory leaks during simulation. [DONE] Disconnecting from Ethereum node…
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x90507e74ff35edb9cfa17a298e1f04008c3adcc4 0xee18c6f0f34fb36170e57f2df7e5ca7f675c0eab 0x5e8c83b4d9f2c251566451af881613b279110c5a 0xd3632611933911a83491120a6997eec689b4c186 0xeef072d057151442b6e3c06e25d2248ddd03c86e 0xd55cd7bd1e232ebb7e52979d6670ed0de7e0d5f8 0x05fc057ac470053d23fc49a99b9d5002a9a4b440 0x765fd44be94c3e9c4e369c1e2aa1799e9c1500b2 0x57787d35c8eb59873c59d0784b1264802e054f27 0xf7030067c234cd5f2b176f081de156e03fae3197 0x40102eaf2f5c658cc35d1589cca204ec8d9130f0 0x1f8c81e6646a7eb5c2eec76dff12661c564d5ff2 0x7bc861e35d272968f1d557cc5608043c0a0b2d89 0xd5703674d0f1cc26b243421d8e073d8c40a6d8bb 0x86dd7fdd4207bb569b822ca80e8ab46d7dc6c0e5 0xbd0df569f817025970263a383ca100239928bd01 0x0eafc9b6d983718f6d48ed269b450b7c2925a74f 0x7ae881ccd14f8b260ef41c8a0b9ed4dcdd2b626f 0x0cc29fecd471326343b800a760f40a62cc0cfde9 0x87c09cec3c3ddd5bd6f79e819a4fd905c2da34d8