ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-BCD360557B3F
|
Infrastructure Scan
ADDRESS: 0x83f3853708cf613f3de4dfbdc5efe2bdc1a134a2
DEPLOYED: 2026-05-01 18:18:23
LAST_TX: 2026-05-01 18:47:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Mapping peer nodes for transaction trace… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Garbage collector: 0.97ms since last run. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Mocking MSG.SENDER as 0x59ae40ce087977817fdc7f6829088f5c0d07f4a0. [TRACE] Execution path: 21% coverage. [VALID] Signature verification: 0x57f8af33f4f7f506d9bfaeb258dde0363f45311e685814c30e14c743590a46c0. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xa270d2fe6f2c8e35b1efe6b0e66df38f750af50a 0x6a4f214226770a68727793daabd545997187da07 0xb46272836bda538aa9f244387b61c15e62ab4adb 0x0b4c0cc49d8f69aa82fe09780b01d6af92eb1932 0xfd1c118323d1af79204f24635a428458e19a5518 0x3599114abcf3fb1f4a428003f7058108a1939921 0x1756b2b23077f09fa120475dd34b5666ec6f63ab 0x882ecb6affb57bf1db20e36d3a1cbeab18d7b7d8 0x20a2586e559a02eee277399fead3faceb1941b2c 0x57e6c5ab1701de8591896d979f615f36030d6be5 0x2d2182607d471305442ff03caead80d49b2cd4df 0x98973bff4c6c2c253a8e85fe7c1edddc81f56bbb 0xce68cab6edc53acd11dd5df4fec47eedf9c6bf6f 0x4501d676d726a28da3e9ac39ec704c149c03bb4b 0x98755ab4cfe456ec59a8e447fc4966f253958ca8 0xda9ecac8de582fc695abb02255b6bcdc4b3c90a8 0x51ae24a37d9b52613e9118da7ed40a5ed14b1661 0xde04bb0a8fd927c137547401f30213fcc7607d63 0x01a946374270d877d245b2820660982f40f6faea 0xe357ddf7e9c17b25e7b8f5dcd9a98c42265d8e91