ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-1C585F3F5830
|
Infrastructure Scan
ADDRESS: 0x05df24bc2bfbaa1f02b9599ac271919b8ebb8951
DEPLOYED: 2026-04-29 01:57:23
LAST_TX: 2026-04-29 12:59:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Fetching raw bytecode for 0x05df24bc2bfbaa1f02b9599ac271919b8ebb8951… [FETCH] Warning: No source code verified on Etherscan. [SCAN] Identifying function signatures (0x0ba81291). [MEM] Simulation buffer: 1024 KB allocated. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Mocking MSG.SENDER as 0x9b590852a77e2e44a3f5b874b304da5ae57bdc11. [TRACE] Call sequence: e9d1 -> 5b03 -> b53e. [VALID] Generating cryptographic proof of scan… $line = str_replace(‘E071C3AB’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xe276d862f428a3e2ed8c88e6f06918321520f24e 0x41a3f25a5259773735ec3c2539df186f432107f1 0x13d52526bd35bc689d25a345c17a9ba398744b22 0xab250f1271a6833974dfd367588bf68527f68918 0xf0c3ac55c12be559b2a3d5d262f5a452cde120df 0x85bd140fae8bf5a48c2a9df3b89285d1df34f3ee 0xb737ee559d5a8208ecb2df1d273652fd58ecd71b 0x2ab3ea379c4a9bbeebe9d5226debaf5074ea6ef3 0x940de230a6a2608571572b12cf8c929a34e54e7a 0xae55475bfc92a5601d02e1118c6fd9205ea8ff15 0x66ed922cf032366e9b751063818d1265a18c3b05 0x140651f30f107055bc2777a59363dc530e65b370 0x985ef36a4297510c2980407ad417b456935f1b0b 0x2d57573be7a772e5f6fdaf5e16500e55e09ce684 0x59ec5eee929881d8f864f9066feb8a617561abc3 0xbc75cecdb1f91c446082ca7baf32a9d92267c487 0xaa24116bc4c441dc1c994f73744dc7cc1b2ee7a4 0x99f694bd2951931b4ff2a91974af3da1894d557d 0x02102444bd6065f32485abae024ebb93ee907e0c 0xc6bf561ad67868336f8fd6d5d810c20dde0e081a

