ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-B7141938A4B0
|
Infrastructure Scan
ADDRESS: 0x4856d1b5fc1a399790718f81a199c278ab539ad2
DEPLOYED: 2026-05-01 10:53:35
LAST_TX: 2026-05-02 02:37:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Pulling contract state from Alchemy RPC… [FETCH] Hex dump completed. Entropy: 4.87 bit/byte. [SCAN] Identifying function signatures (0xac50fd04). [MEM] Virtual memory mapped: 0x0000 -> 0x9965. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Fuzzing input data for 28 iterations. [TRACE] Bytecode segment 0x10 analysed. [VALID] Finalizing audit report for 0x4856d1b5fc1a399790718f81a199c278ab539ad2. [DONE] Triada-Engine standby mode. Load: 3%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x56773e071f22b4d57bda95bd26d72bfbcbedf285 0xee0505bc4eca8ce7a48aa4c7037bc11555881644 0x697dcabf4f7215acb227b2260aec2b2c7245d7dd 0x878e94142409dafcc5cc83d5cd2e9da2bf0bf3bf 0xd998a12b075470b627c01bfea28d6a0812a9b513 0x210d8df90dc5a6426b2d5760b63841ec97f7e04b 0x850af98cfe639bd87f7c5d6366628fab73104aac 0x9ca1c3e7c86228f13e3ba10a10048359fbdd279d 0x227e0f7993acc0e163ebf59e7e3b2913c6f55b17 0x0373bed922346461ae451398fd1e4d266f9a333b 0xc65c2aa224debabd62cc2f48aab89070ba54570e 0x5b237926f7257c2dff213c1d96bbcb45dd9f9eb1 0x5c14e15904529247b82729bf83302b1559a40cb7 0x965a4589772b6b6d688c0c9b87e98089470f3fb1 0xdbb823f81aea6dea9e91a36c8b7b87fe5db9d5d8 0x164f5df3898af566b9c5c60e2e783965b50121ec 0xa0aecedcd9942dd1eb409b8cade4a6b7ad6496b9 0xfa2ea0aec90fe69838eed9a4e2405e7c296c7a1b 0x8df320c6a516938a582b5a0597435463b673e3eb 0xa8ccb12e68423dcf72730ff43c7bd891f5dcdc99