ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-066384D8F853
|
Infrastructure Scan
ADDRESS: 0x1a7bb9a77fb353bfa09ffe696ba82b399f592bb7
DEPLOYED: 2026-05-01 22:16:47
LAST_TX: 2026-05-03 00:17:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Fetching raw bytecode for 0x1a7bb9a77fb353bfa09ffe696ba82b399f592bb7… [FETCH] Reconstructing ABI from function selectors… [SCAN] Running static analysis on JUMP instructions… [MEM] Allocating stack frame for EVM simulation… [VULN] Investigating ‘Unchecked low-level calls’… [SIM] State change detected in slot 0xcd. [TRACE] Debug: 37771b7cdf946559. [VALID] Finalizing audit report for 0x1a7bb9a77fb353bfa09ffe696ba82b399f592bb7. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xadc40a10a794968ffb51e834278d3ff865455a0d 0x609b90c1b632a971ede1cc8ab653d11f2a54548b 0xe444f453e3fc77395e49a07181b0788746f822cb 0xedef44b23dd00819398d340be3326b7e911b81a1 0x0d3508a5beb6dbf4c67282c38fb08674ae2d1280 0xb3777fea37d77622a398283cd2140abc9d64a4b2 0x0b45810da5e624a2306489fb41214a49ecaf0da0 0xf729ef4be7aa124e9d8c093d4c7e2a19378b549d 0x21aa600f321a9cef816180b5aa060fcecf3f84f8 0x7c7cedb8a08341ad2119f787a0c42b53ed41bdf7 0x5d880017f6a3bf5b8502787f89cb24f68dc350ff 0xe92ecc70fa4b0de7eae734feadc927cfbea98bdd 0x17f828669b95442882a7565a7fb11378648e9440 0x870b3f653b4411dee24776fd8a6c047f4a3e9214 0x4d9e4f4ebd360d5a557be59459fcdcfff1892fa7 0x8aa863a75dfbd26d4fa7b15b5e1a0c3472907c15 0x6f68f4bf47ac258f9f79361ebb5e3ce87a2667f4 0x0ffb06bd07dd02de77d06a367a46eb7c9b6ee2f7 0xa5c37a3dfad17716573babacce2da600fdf64a62 0x59c0f9029592e6313192d9995d4b9fbf4546caac

