ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-2203E0492DC4
|
Infrastructure Scan
ADDRESS: 0x9bdc652ba1adb8b3a06743a5af5d8416ac5a3d18
DEPLOYED: 2026-04-20 15:04:59
LAST_TX: 2026-04-25 06:08:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Core initialized. Checking license for cluster-node-3. [NET] Fetching raw bytecode for 0x9bdc652ba1adb8b3a06743a5af5d8416ac5a3d18… [FETCH] Metadata hash (IPFS): 0e7754ba…4bcf18f5… [SCAN] Mapping internal logic flow and branching. [MEM] Garbage collector: 0.16ms since last run. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Testing edge case: Zero-address transfer… [TRACE] Call sequence: d9ce -> a2ad -> b987. [VALID] No critical memory leaks during simulation. $line = str_replace(‘0xf2e2b8cd39f4be46a3529118002970bc2fe61e4d’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xaf989ac179481c432a958c5661dfe5b5d1b55275 0xf29514c94db6d5780f2b6372abaeb0f1f5460070 0xdf603faf154bc89c7b28fc0a57a79013d321d6b3 0x791f1e36b04298acd49c0938e5e34e3f03bd1796 0xf3314c1c9328010aad2215602c5d92b97ffafc27 0xa464df2ac8018e9739e8709c9926f7d64dd203d6 0x3f629266f711e63d1bcf9f80f042750bf9934a3c 0x8c93bb3a7ed88da0647ea53f8cd3f57832a513cd 0x336f42511ede526a819b3e8e2e046cdf44fe419d 0x46c30390914b6f04e9d3729b0767b6cd78a5f317 0xccb57bfd3534aa79add6c600d890295f4ef446b8 0xa631aebe2c4fe4b6eae02298d36645a1aacc5502 0x21bdc1098992ab5a5ed40a8bb79c5a637f8f5b18 0x24428f4c0a1fced87e84241f103f4aa4ffad51be 0xc52defd7863f9aa98d7ed8693fd35edb6e3735d5 0x84a707c11e6025f5d05baddf72e6934c05fd3166 0xc96bdc3476a3722bd8f3c8030dd2f7d35763c739 0x608647af58b7e300146f78798a09e22c02ec5674 0x5a98b960a116210711c8157c1c9372a4d558e9b5 0xec68e20a81b12a86123259236d2b7e564df59ec5