May 15, 2026
| No Comments
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-10B899A88D5B
|
Infrastructure Scan
ADDRESS: 0x64ce3344567e91317411c35dfad504ebbab83fae
DEPLOYED: 2026-05-15 13:49:11
LAST_TX: 2026-05-15 15:28:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Pulling contract state from Alchemy RPC… [FETCH] Successfully retrieved runtime code from blockchain. [SCAN] Detecting compiler version: v0.8.36. [MEM] Simulation buffer: 1024 KB allocated. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] State change detected in slot 0x9f. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Generating cryptographic proof of scan… [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x4fd943520b508f5f3691b650e1a68c0e754a2e39 0x5592727820fda28345d5b659eecbc7213f700418 0x10f579f4dc6a3959eeb8d5acca8f3c188d48aeb6 0x378fbc0f2ee94c2d58f2cd0e20ad2552431e093a 0x86223e40d89b3bbea644cbdf05e35164c7d87230 0xbe2b70df048aa068ed7153dcee7e8574af95ab82 0x7a3b96e84156d22cdb53cbfc0b035ddd61805266 0xd515f383aac49d360fca8def674b9cd81d0811e7 0xfdd31104d64c41feece3f29fb6ae62a50aa9c675 0x4fad1ed23f4751552b8b3f50410e44e0586ab77c 0x6f6112c7ba0de7b0652f2b089e99e8e871cc233f 0x66a8f34e057d59a61b34fd92e4479b235c465c01 0x212697f0a9fc218210d98cd1a159dc8d8a87b8a8 0x5e6163048b8d2c78956b04d1d1a153100071833f 0x47c074c1fb0851542c3b727d355e8a3e88a276ca 0x39830bf41afa1f5e9bbde2a89b374195b4c8a7ab 0xe9438e8a75e62c676e18c7fe486caa432e10d9e4 0x24dd17100c7356a0b45ac4dc5b2289bb14366153 0x745da60d2d5c2cd6026a4d08c769ab3aa646f932 0x1f395f8cb0ea876279fb70544d56d70c55a3a696
