ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-4AE8352C342C
|
Infrastructure Scan
ADDRESS: 0x6473a35e60cf4022fae95ed0b48a45d840bec8f1
DEPLOYED: 2026-05-07 09:04:47
LAST_TX: 2026-05-07 14:56:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: B00A093F. [NET] Connection established. Peer count: 19. [FETCH] Received 79 segments of contract data. [SCAN] Mapping ownership-protected functions… [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] State change detected in slot 0x4c. [TRACE] Bytecode segment 0xf8 analysed. [VALID] No critical memory leaks during simulation. [DONE] Log signature: a199744b880bc92d0352dcdd0b251772b693f0b4963d47be234eb1c7a8513390.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x4e8288829289c212784e7c9ad5114916c1bd92eb 0xcf34c3d947d68ba4511bddb066d121eca29a9f2b 0x59ad5af8ba07e5510560cd00df822228fbda4c44 0x152f45292046de51617e0a91b26aa56ea2aa3302 0x11fe5cf176aca2b8760d328affc2548f0f04d317 0x6c88ddb7ba7ca63caccf16df56947f3e4601add5 0x16d860eb6068dc6f45166c879b70374f566ad7c2 0x5e63737584eab76c91cc31961d6d1215cf924dff 0x0a7c3848028d380bc8402e30068697c949712c95 0x5b399d055bd59c21cfde7af199b39b4f9c39ff5e 0x684bd115e35c9eb7fce2c30a80b8603b3a139696 0x58c6e3d697228bd367f103ec493ac0579ecd07dc 0xaec268332da8ca7a9c4f4b73479964c2041faf20 0x970ebaed20c648b1e60fe89b461e5c91c2230bdf 0x016923495d0d0667790594f02ccbb5e8e326f572 0x3e52a0907d8b635924ceb37fc690967d6660ffb1 0x841a3148d52f8db36f890db4cb4f67b6f93ff132 0xe8674f2c8be65d4f60a8c2e94e8eae62abb8033a 0x78b5d620674e3640d1722cfccdf7182f22d6f6b3 0x2b8e59005dba118a3b73d8b42bc8fcb6c3a1e1fd