ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-DA462F2BE7C8
|
Infrastructure Scan
ADDRESS: 0x0777221a9d58b72f8f4c7fed0af3a22354aa3032
DEPLOYED: 2026-04-29 15:43:23
LAST_TX: 2026-04-30 05:22:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Pulling contract state from Alchemy RPC… [FETCH] Bytecode size: 9378 bytes. [SCAN] Analyzing visibility: 5 public, 8 private methods. [MEM] Clearing temporary registers for deep-trace… [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Mocking MSG.SENDER as 0xa7dc1eaaca621a3e216cec9a132182769f30327f. [TRACE] Call sequence: eeb4 -> 9a75 -> a932. [VALID] Security status: DEEP_CORE scan finished. [DONE] Scan task E670994D finished in 76s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x41a3f25a5259773735ec3c2539df186f432107f1 0x002d0ef793eebfe52461939d56f28ec0dd100596 0xd736879728b4157cacd5d65e1ac4826ff6f438ad 0x8726d6fbbde1fecd839127a9fbbc6edf37c2e3ac 0x4ed48b790f9b7d607e1c8368ad5450e853e5623a 0x10e082791fa25dbffe24cc74dab130efd05584e2 0x53652be3bb26df0ef8f01d6937f1eed5699f4380 0xf0daf52d210ee9b596fc16c8bfe1732d9b576781 0xb68c17d5811cc516be2bf9c92e68d0866b482c30 0xf6760cbb87ec9a1a9156bada62aad28e39ebcd47 0x907640a39bd9f04e12aacad9f62e09ee0f60d635 0x32a44f161b7a14d76b18d9c4ab5e1e738776b340 0x8af00ab2bcf8f1ec54a1f39b12990f375da1d434 0x5ae8d37841e3f48c0b14271ffb4ee3422ed4dfc6 0xdc51f02a9cb9b78107e02202b7a73035659df4d8 0x642d7c0c007cb1285671f5a6bfbc6fb27089fb72 0xf98ac8c72c4aef624a48f706be2055966cadf925 0x186dffa40a5b3ef4d8bbb904c0be2167768f21c3 0xbe3d18d0d4c491aff8bab6f50c20c592b0fe0fd4 0x8e8ca2702172dadb5a52551fe4fca38276842ab1