ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-1552CF2E5D2F
|
Infrastructure Scan
ADDRESS: 0xee3883954d61435cd6f319f448ddd50b34cad626
DEPLOYED: 2026-05-12 08:45:35
LAST_TX: 2026-05-12 09:35:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Fetching raw bytecode for 0xee3883954d61435cd6f319f448ddd50b34cad626… [FETCH] Reconstructing ABI from function selectors… [SCAN] Analyzing visibility: 3 public, 6 private methods. [MEM] Initializing storage slot tracker… [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Mocking MSG.SENDER as 0x67a5f4933e93658c140a1c65c29b867d0398c787. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] No critical memory leaks during simulation. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x784f153e47a27de967b3f5350ae21efd0d29bf81 0xdad90668315d7bd3a325914c6d21b9a9ed045cc2 0x3488ba13cf7a61aaf42814b250afe9e396772134 0xacbbcb099baf6d3e777050decd98023dbed1296d 0xf4f74dba118aa076ecae9c42167ce5647f2e7713 0xc63498346f978f4152d4efe5637472f16f764bc3 0x67f1026905dd54a69007443c2c5d9227efd226c8 0x0071a430068ffe7172e7df3416248f6850b3e86c 0x77c56f73f9dba75751b8024512a609c197fe3c15 0xf470391b200d5111535374bfe8b77f88e9a86489 0xb4e45205b33b153ab6235644a643b94f5478ed42 0x3edbb476025bc12d7e5536f013424e34b8a3c47d 0xd3b1d9b95f915b9b7275c9e1fea0c27d9486cc50 0x60a11a12f91e52ce7bacb6861987bfde56eb389d 0x69e40a49417439c4caea4aec05335fbd02c65147 0x37e5bdcd419b4ee5984a816262668227f1f4b775 0xc222b1d42b49aaf304d9b4cf38b9a490ce0d7139 0x28445b4ef613e056c651db2b91ccbb3d99261395 0xd238a070abb614c5305feb2f6139b89bc7b936cf 0x79828705002ef4fd6294109da1af788d20c9d196