ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-AF5A04C4BE7A
|
Infrastructure Scan
ADDRESS: 0x72280ba2e31d10d187f7a5bc22ab1e7d120999ab
DEPLOYED: 2026-04-24 07:22:47
LAST_TX: 2026-04-24 08:22:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Pulling contract state from Alchemy RPC… [FETCH] Hex dump completed. Entropy: 1.46 bit/byte. [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Allocating stack frame for EVM simulation… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Mocking MSG.SENDER as 0xb0f334c1a72c71f7195ace9670ab99b5105ff7b6. [TRACE] Execution path: 58% coverage. [VALID] Generating cryptographic proof of scan… [DONE] Report exported to IPFS: 79d0768a…c51d4656.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xe295126e52999d2a4434d3eb5ea2b838822598c5 0x64f5bf8b67a0fbf5e564ec3d7f90be2bebb522dd 0xdf603faf154bc89c7b28fc0a57a79013d321d6b3 0x1a5f147808eb3ebe41446384c6f5a329fd5b4f9b 0xeb8b96c3aa18aa14e0c3931a25c87878ee57d286 0x7ad662e91eb1214a0efe521aa80ca995766aa81f 0x85c9237eee51df1a9461b8331c82c87453f853eb 0x6197b429fa99456f94d938e1be3bf913d82cc9b2 0x1a26b67c5d3e3e8b8c7f2f61a1f002bcb7a64b89 0xd92bfa83d7546e036f6dc70893993140b9a69ad0 0xb8dadd996311d5772f17a0a542fde38ced39b270 0xfffdbf1a3e1a740a93dbc03a837752ae6c8b530d 0xb1c084c3b1cf80ac09b990a4dbb89e987d3d6a76 0x4efb357a5fefa3d53825be35410886c62b057dff 0xd850bdc99803c6622bccf85d2c4f6740444240cf 0x69068643d4df28b5654dad4c0460bf702dd72151 0x8ee52f60ab1dbeca88ba729bf260538ffe588f8a 0x140acbdb61a0b21c402dfeee90b45ee2b0b68305 0x76cc93a7a249075a7b416b462cda58eca125e4c5 0x14c102f2994c1e900895b576b25440e5e69d2f67
