ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-588C9A586F4A
|
Infrastructure Scan
ADDRESS: 0x0794c1ac1cccb05d600bf4e9213fd32012a53fbc
DEPLOYED: 2026-05-01 10:53:59
LAST_TX: 2026-05-02 05:55:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Pulling contract state from Alchemy RPC… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Running static analysis on JUMP instructions… [MEM] Snapshotting EVM state before execution… [VULN] Warning: IS_DEBUG_MODE found in storage slot 18. [SIM] Reverting transaction at PC: 1356… [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Gas optimization score: 52/100. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x1f9144c16ead5f887cd82c877568a87469a94b78 0x5c07672f7a8d12d06f5e997a244036855dd6b050 0xb9f3025d78c486e73d0d42862a0b2f6799402ac2 0xf693ec1814ecae20071a6cd0d589ffd23b24cab5 0x072932d181262402ab3e0e3e1033cac29c3ed845 0x3edf9c76d196e36526c22c5b06c950b9a122128e 0xa21f5cc7b56f01d36a8c08bf8939ff79d6e4d557 0xc9ac25260897d2e9de1debf60dd48df9a0bd7384 0x2192b3caba64aec46d7faa25188b858941d09c8f 0x09a8c1dae4090052551d0c892964c77935453d53 0xbc933c4e2c585cb20a813e00355250ebe725bd41 0x8375332198ec2fe0c94b4fed3d424550eb602ff8 0xf9af04349a02d4684a3dc807ccb724b574343d52 0x8cabd13af1d45404a484ab22bb65dadf71048643 0x8f2f2d8e01c510d632e78feea0e2171444555872 0x9a4ccad826021c1d0838efb8506fcc165768db5a 0xa60e270958014c94463794d26f0c09ee2edbdc6d 0xca8851c49652dccce7c919bdf435456fe499630a 0x9ef8378741c26b8ba13981a9749e1b9942fdc9e7 0x6aef839f41864845f7267333ee5f9dc9d175b9b7