ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-564687CD994C
|
Infrastructure Scan
ADDRESS: 0xa88a87fdf9f1eb775089da8b114da90eb4ed285b
DEPLOYED: 2026-05-13 16:13:11
LAST_TX: 2026-05-14 01:57:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Pulling contract state from Alchemy RPC… [FETCH] Successfully retrieved runtime code from blockchain. [SCAN] Mapping ownership-protected functions… [MEM] Simulation buffer: 1024 KB allocated. [VULN] Probing admin methods for ‚Access Control‘ flaws. [SIM] Testing edge case: Zero-address transfer… [TRACE] Debug: 36de32b6273250db. [VALID] No critical memory leaks during simulation. [DONE] Report exported to IPFS: 9bf3c4c0…c59e85d1.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x700a4aeda23a8a6986594ec5e942c75a5fe88184 0xcef19379fe08692d35c022ff8ae3baefe90ae3d9 0x87d4f1730c5f3fead355cd07cbda90bae3ff0f06 0x1d1bfa21f5f5de94657eec5410adebd2271f0735 0xae087fabd170abeaa7b92a1bb5e3dba52af6ceb0 0x632f4ea16f5cdd9bd01e01470e41ea88bbd5ec0e 0xd1cedcd32ce26bcad230a3e2a7fff6363c0dea1f 0xab2e76589d9bbe4aaeb7d0f062b9d17a9a8d84f5 0xa8ef747dd2cb50b5f2d7a8ab52509af278ac2d3c 0x783bf15b171934ffb9993b03100b7ebbaf362f85 0x69fcb6606b12685b57c5ffd76aba471a26d3bf74 0x0f3ab0289038373583dada2ea538ff0b959fb769 0x8260b4dd36d67f042cc8ce07dccba77d16545f65 0xd094dfd6db23758270ad360cd3ba0a149937ad9f 0x938e30b1d41cf07dc40f4617adfc862a652a7b33 0x6a2a39a71a2e5f32bc4617f43789b7df15ee4393 0x686c219ab20b89ab3ac376babf092f571ad6d7e4 0x324bedf0fe73a441b0b36e939526690526bd564c 0x110d1551aa3fddbf117d4adf3ab0205a7f352b6c 0xb0c089aab42d115b0babad2eab88e9ccfce24b31