ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-7B1C1C597BE1
|
Infrastructure Scan
ADDRESS: 0xce4a5d11fad8f04d76eb65a588dc6a2e2a734255
DEPLOYED: 2026-05-10 05:09:47
LAST_TX: 2026-05-12 04:44:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Fetching raw bytecode for 0xce4a5d11fad8f04d76eb65a588dc6a2e2a734255… [FETCH] Received 13 segments of contract data. [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Snapshotting EVM state before execution… [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Mocking MSG.SENDER as 0xf96abb02bceb0bec4fdc29394d858ad81a389144. [TRACE] Debug: 883284b491230f3f. [VALID] Signature verification: 0xa3081648b337c23adb3aa09768842f4670b6b67567cfc4129910e2735a532220. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xc66e480ca79b418d6a22f6dba98dfc51ea31d02e 0xbbebc4411532574ad897a6216279f11e4363d843 0x514b736a20eb0f1e3074a553ce6b1f20edccb28c 0x9090cbcb096b09e8b16f524934af00cf679c9883 0x7b33a8bb0714072c495a06ddb069799c3f64a73c 0x5cb9832ea365c041eaa43769288f3abe48a64da6 0xc7b60b78d0c0fc1c44299aae20eb3fac95716c41 0x7bd14f0675d0ea07aeca56cba39d126b5cfc792a 0x593e67628bf7a7b700a4ee7be3e358744fcded7e 0xbcb2bca68edf968ad7304cb71ceecd3ad60962bd 0x4559e63c5744ebd91f905834fae7ff627cf486d9 0x1a50da77615fcc22c35619693102dba0f63ea454 0xfcb6a929db98a1d69b5f33a2f7e073cb7449cf30 0x8d9438012991c504af2a15109a0f6018b25578f7 0x5eaf3c3ccca88f3851e9ded3e1622445c2fed0bb 0xa430e23c3f9a7d9a93178268d9b99c4f968a83e5 0x1b32b23e1a545728bbc74b4ad430240f3aa42041 0xd8cf15d2d2c2a3af3f591f82a65af5b7762a5684 0xabf2004823afe42fb2dce6e8e61a90ba21cfce6b 0x19579bdb40e1c82362ea0b9302e3a5e00a33ace8