ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-BECAF95B1345
|
Infrastructure Scan
ADDRESS: 0x823e62f9f24e2cf0c43d449ae740878a9a6389df
DEPLOYED: 2026-05-05 14:35:35
LAST_TX: 2026-05-06 12:58:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] System integrity check: 100% OK. Initializing scan. [NET] Handshake with node 0x7341adce successful. [FETCH] Received 11 segments of contract data. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Virtual memory mapped: 0x0000 -> 0xe77a. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Fuzzing input data for 17 iterations. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] No critical memory leaks during simulation. [DONE] Report exported to IPFS: 342ab2ba…de68d729.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x200ddffab804307e0af8ef9b8659f71353d752ba 0x40bef8a5283cde970355d2f6c5fdd3507fffc142 0xebdeb96299852f5d733633d5956a9ee3af237931 0x59c11d0818db64c87b5c219b82e72ffe0f00afc0 0xd1baa732bb699ff599b4b3611c17243128cc753a 0xbcd75282ad940b289a82a358f82cefd2d8a3b263 0xf97e6e0cbeae605306eff93d71a01204bf57e8cf 0x60bf2df49f17529cf956d57848ebeb8a0d0a2757 0x6a8b5b0d1936a00d9657994b1f04a21231046016 0x5c22911cd0208d7665380ae6a6ac25dbb0676ee3 0x7880287a177e060b7024c730833090a8670b2107 0xa94c3ddc28eabc700a8e44d2f3812a41c72f3bb8 0x698d80fa31fe4e578a14e2cebad75e6ca144b2cb 0x36b554e4bfbd1f2cf2355b128847046d7b5ff6bb 0x679c42098dd981561fb6e8b0c72e4f4af3157434 0xe44767ca067ad567fe0be7d86f034fb8984371a7 0x4009fc878c9eaeeae2b297a33614f93cfd0e1526 0xf1f95b877251a0e003a6b6b95405f40037a50430 0x8efe5e7680dd83b1cfb17c676f23d47b1f217b96 0x0900abafdbcca2aca685571a8be8fd062c1d1471

