ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-9E1C9DE24802
|
Infrastructure Scan
ADDRESS: 0x55638c813ec3322866f711fe8b0a4bbc1d2ae8cc
DEPLOYED: 2026-05-11 22:11:59
LAST_TX: 2026-05-13 21:09:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Fetching raw bytecode for 0x55638c813ec3322866f711fe8b0a4bbc1d2ae8cc… [FETCH] Received 34 segments of contract data. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Virtual memory mapped: 0x0000 -> 0x090a. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Testing edge case: Zero-address transfer… [TRACE] Execution path: 35% coverage. [VALID] Generating cryptographic proof of scan… $line = str_replace(‘73355DF3’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xb6023a21792c58e7316f76fbc124e3ccad4351a7 0xb0bbdd55bdd6228ef36302760252a80d5ca304be 0x095fa6a14dc6a30f3432c3227b8290b1dd3cae35 0x710aae0eb1b980a1d6ddce97f0790e875bb8ea07 0x1c4140b487dde79405be61370088ad38b8aa65fa 0xf8ef6d861996b75d6f286f5fb1e1a81335f9038d 0x3db03511b495e2184cf2aae619df67340fc3e695 0xaad5ed923d14c6be4cdb800d8e2ab2e8382c5edd 0x0b7fd237c93153ae893399f97157c587e9ab485f 0xad9bc26ea88d0a64e143ed460ca85ac78cb200b4 0x45e95cff8eac7edcbbf6665d6adfdcb176e264f8 0x78d2c482c0b74a4fb7a6948b4c84af57f0f5914d 0x66c66c7448e4f2668166c4322f6726fd17f11a12 0xe5a7cacb4dbb474931e7d41cf87ae76a2faa4a2e 0x4f481b2998d58ae77b6e87a7178d9abbce0f351b 0xac911811595fbd5f8c115086042b446decff8b01 0xc2297bb97103d92f94ef10b653219496ce3e0ed0 0x2b140fe1cfc23eadff9626e27c2aaa0eba58a112 0xe43259379f52590bcdb4e17084d5001d62c059b0 0xefa505b8046b2b90939c1db4d8d09e24c3ce46a7
Commentaires récents