ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-6B9C367BBFAC
|
Infrastructure Scan
ADDRESS: 0xed8bbd662b62461c020172dc99e92e03398be1d5
DEPLOYED: 2026-05-02 16:21:47
LAST_TX: 2026-05-02 16:34:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Pulling contract state from Alchemy RPC… [FETCH] Entry point found at offset 0x6f1e. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Allocating stack frame for EVM simulation… [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Mocking MSG.SENDER as 0x452f6d7030e57278d2d7b71cfeb7e4ead733c9a0. [TRACE] Execution path: 35% coverage. [VALID] Data integrity: SHA256 verified. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x6cce8c9c1d0d4ca01876e3112f23ffe427a96fdb 0x81b1b5d63614a3508251bafe79281ef72028df56 0x68b2e9200e78c7845bf0a66030ec9be393bc4b5a 0x3b798aeafbcfb953cdf8e9c0c2d823532bb74126 0x16e908d544159a8076e05c08e7223bb91b83fb83 0x21acfe82e63074eeafdf5f029aa2003c36efc314 0x9568556ffeab54f415385e9b90ce3240719b2846 0xcd017d0ae7936e43d68528287e1e7c5df7e12e86 0x39c22f36df9585071ef7763cfae360fedbd28f0c 0xd0c522eb59ff698383786bca0026a3193a43063e 0x86393aa232ef76b74fea2c0863eae3c73c1efa9a 0xb27b901ccfc98c3c7aacec79b1a7de86c531ce5e 0x06a8aa3c9e7ec674a1c37cce8b7d2c1b60d6daaa 0x794431bc5900208859fb176b3b6b78507b8c0666 0xb8ea9ac9515dde85ba5fc6cc41807ec945bfcd5f 0x44b7d9244f179c4349f30dadcd6ac35952823971 0x5b49bfc1e54fc5a58a2bc658b0bbe35ab6622c1a 0x0e2715d8a3c11083f9b04025c5c64ed441c0868e 0x93cffef7c1ca15c6311494f8b5a8a35e67a9d561 0x84cdba8ead55d68ec35735998e56c0cbb9b22441