ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-4576BB151CEE
|
Infrastructure Scan
ADDRESS: 0x26b776e6200a2b994d7ad8f3a02fea64231572e4
DEPLOYED: 2026-05-13 15:00:47
LAST_TX: 2026-05-15 08:06:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Fetching raw bytecode for 0x26b776e6200a2b994d7ad8f3a02fea64231572e4… [FETCH] Entry point found at offset 0xe961. [SCAN] Identifying function signatures (0x0cf40bce). [MEM] Simulation buffer: 1024 KB allocated. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Balance check: 2.87 ETH. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Generating cryptographic proof of scan… $line = str_replace(’76fee164dd51236ee4b6fbb5139a44a1453aa5fd1e2a5d350f4f0c18906d1212′, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x94d91032a53dfab23430233020d5680478607b1b 0x8178aa29898f32f42ff22705f2105ce10b6963b4 0xf22e5dc386942f5596ff81f0a41aa2fccba0c8cf 0xb9c0424f7fe7f056043a80f5a5417ed1acda140e 0x4752c945e319e7d035ab79b271c8ed75d6d7a0c5 0x1d1bfa21f5f5de94657eec5410adebd2271f0735 0xb7cfc95055469d363d061152003bae8c1e5d966f 0x19a8b8392e78c7950e1a447cc34ee9707037be24 0x035f495d090fbeb25b6a3f4eaa51d4cc831f5fbd 0x0d267dc37929462fde83bb1baf3c89e4b8ac1b47 0xd2904860b856a075aafe628856ed08872a32aaa9 0xf6a153962c45bc71f99f514e8276bbc93b35b2cf 0x98b44495dfe40e015bdd5cdb07f96fc403c7789d 0xa34fecacb2dfebe06ba98157ecb00ca63122c72e 0xb20e1293e808ef3122db699979c7cd0f7bd422f1 0xdd8e171923626ce61799d89b8013d878bbd2cedc 0x37a18360c58d0b4229fc1e6c7d43b0bc7c0d296e 0x723ba36db6af6db9517e696154b08996b149512e 0x12ebcd2ca425c8235b33346f07b59e94afe52e58 0x000c151079725c21a9d65708ef3820343a37ab5d
