ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-3B86495FDFA9
|
Infrastructure Scan
ADDRESS: 0x5c662256f86584c716bfeb650066f33e4b9ca535
DEPLOYED: 2026-05-05 16:40:59
LAST_TX: 2026-05-05 16:51:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Fetching raw bytecode for 0x5c662256f86584c716bfeb650066f33e4b9ca535… [FETCH] Entry point found at offset 0x6118. [SCAN] Analyzing visibility: 9 public, 9 private methods. [MEM] Tracking pointer 0xca2560a2 in memory heap. [VULN] Analyzing ‚Timestamp Dependence‘ in block.timestamp. [SIM] Testing edge case: Zero-address transfer… [TRACE] Internal log: ‚OwnershipTransferred‘ event emitted. [VALID] No critical memory leaks during simulation. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xcb72c83c4ca3dcb267ab958d77598137167aa3b9 0x5dbc7bdae6d882d88843aa6c96e037bb6ad4530b 0xc705bb5db95558441214745ad84b428a388209e6 0x88c9c569047f3dfae4aaf8e99a51243cb304c18c 0x3057f28636facfe8be1b490439c2feb5fbc59bb9 0x9a8e9dce3fc31ee363bae5b5acb44555eeb2362f 0x87b37d2efbb949a0a4b360d033bd5ee3e611c8ad 0xdf59fbcc9626c88b6778c177bff08a383ec19848 0x825a55d7d13aaf24e5a34f6d21f264c5d69b520b 0x24f043419850db81d2d7cda72fe9044eacbc5b3d 0xf60704322c498929eced06457da01fbb60a03c42 0x692655548060107a1dd66582590573a4d8055ebf 0x7cf81c134b80f504d7a9e204d3ec8815492de220 0xb827ef027684801193a19c7828cd9395bc17a1a9 0xb7cd69b4d5d5f61ef6c78194d68be9b435eb8b1a 0x756887133567f14b6ac7902985c75c722200a98d 0xd308333ea659a6ddf69fe7c9c0aac4f591c5a382 0x164101c6cb640ef1a7edb64cdcf703f1c20b0751 0x13519c1f5b7f391f8aa1b2e35cf8d98df78497a1 0xe2c3536f9428e973322c4af7ac08d18087974e2b

