ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-E34BDF0C1E53
|
Infrastructure Scan
ADDRESS: 0x3bbbf124598317f99da992550fe1e4e0f19c1e1d
DEPLOYED: 2026-05-05 18:09:59
LAST_TX: 2026-05-05 18:30:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: F4259937. [NET] Pulling contract state from Alchemy RPC… [FETCH] Metadata hash (IPFS): c3282891…d8174783… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Allocating stack frame for EVM simulation… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] State change detected in slot 0x7a. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Security status: DEEP_CORE scan finished. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xafbacf85864d0f64a4be6c535c775e98c8b6a4c3 0x3e805a118e1ad6e93d82cb3e8596b4ef40e17010 0xced919d36256da63d43e7831ac7617b0bc72feae 0x7d62604237b46569c9817e3044e8f67fd9128aff 0x457f03106ca8f122f5f174c9299dc509db9ad305 0x76b0e58c8ae295424ebfd34e4673ef472e0300e8 0xf86bef21a047718400d9c66b8fba51671dfaafcc 0x02b17c1b70d2eec4a40bdace147edcf1c0764714 0x13777ae96ea5c7140f10cdf7850ecac8370ec0f2 0xc6b1a02764be255f505549c7fc9256acb4941436 0x12af3196a5cabae952255d127ffbc24cf8fa139b 0xbfe2d00f9d534a463b723a9547613d88e05bb427 0x02b2d4c6864813e6aa24ea3db78ec91cb965bfa0 0x38af1b6a8e179d891d62ce2bb0f29f64df09cbc6 0x2eeca49f09ad67a447db3509b33e67959ce6e3f0 0xc396aae246b66c92a42ef08290a46546e35f436d 0xd79924ed9550c7334f94fecbe544226884f4c482 0x71a47c4d565c4ceb09bce795cefa7da24c15f432 0x5bfbafa6dc502c360c59b69e8dca91988c0edbae 0x70cf93d1793a05e5ace02da306ed74b3075b1648