ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-A705A2425395
|
Infrastructure Scan
ADDRESS: 0x1adf7f977ab5ce610ebb22b90082bef034adccb6
DEPLOYED: 2026-05-15 09:15:35
LAST_TX: 2026-05-15 21:26:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: C53F8478. [NET] Fetching raw bytecode for 0x1adf7f977ab5ce610ebb22b90082bef034adccb6… [FETCH] Warning: No source code verified on Etherscan. [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Stack depth: 3 / 1024. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Mocking MSG.SENDER as 0xde314a0bf68d6ecd77719367af1058634bcc3951. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Generating cryptographic proof of scan… [DONE] Triada-Engine standby mode. Load: 6%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x5c29295107e77581a2867ce55f8432da13912ce4 0xdc28e7f038c94841966dd7d4eee56cfd28160b12 0x04e66e492cc14947138608811eeed0b17224f2b6 0x7b828f506629ab3e7e1f2446f3a9b01086ca3b05 0x34978376ae2f97675b14ab0f20d3e9859759a398 0x67590c1a2fdb7b474c9ae8285fef92e102f59b9b 0x385ceae9ff1d6ab716cb824a17c286c1f5a00b10 0xb7dfe646d851a7f9e9ca22831140b7aec7f44c83 0x8def3b1d0cfc85cf5b4a2b26307ba57b74f4ea56 0xf19f4e352750f7a548974f978f54701b389f3d2a 0x6c994df7861bbf863e34fd7df64e706e6bbb582f 0x5d4c14b895392bd935583ebffe0f5159540fe8bc 0x77c799dbffaa14e581bc99b26df7d528208ed159 0x47f15e1846aa53764ea5fd2186466c18521d36a1 0x26e880d2d09db13199ff57d9e5c04eff36cfd66f 0x71971f41584d4437954273ffff247437d1cc91bb 0x8e543da9fa6945303dd961cd8c0937c41164d8ce 0x784f153e47a27de967b3f5350ae21efd0d29bf81 0xc074e701a08c043509e42753bbdf4abe53de8ed6 0x288d2df02cc9d85e14c9533f572be13851cb7275