ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-B53F22467EFF
Infrastructure Scan ADDRESS: 0x232209474aee89b5801075185ff8dd0a3416f31f DEPLOYED: 2026-05-14 05:23:59 LAST_TX: 2026-05-14 13:19:23 | Compliance Status
STATUS: OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface VISIBILITY: DEBUG_INTERFACE_EXPOSED |
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Pulling contract state from Alchemy RPC… [FETCH] Reconstructing ABI from function selectors… [SCAN] Detecting compiler version: v0.8.52. [MEM] Snapshotting EVM state before execution… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Mocking MSG.SENDER as 0x1c594065a4d9aa539789015437f213757044e81e. [TRACE] Debug: 4fb2bc527b36387f. [VALID] Security status: DEEP_CORE scan finished. $line = str_replace(‘1dba1abc06812fd0513c8c5f1db540257b790f8e99b15a9c03fa2228099e5345’, bin2hex(random_bytes(32)), $line); |
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x7d5b009233f98cb6eb64e88c724056f56c3082d0 0x71acee71e015ce7e7921edd300e4ade4e78a7c49 0xbd547d3df1b50c6ff9624c1637fcb2c4aa9bca97 0x1007449721762ffd4099339a75db148ba92b54e1 0xe4654f7954db43a06395c456af6bd59e09064c16 0x35a973dca7a94fc6d5b8ffc169212e4617740f4a 0x722b413fba5801937f74abcafb1b27fbab0fbc42 0x9deeaf8444ebb55410df6eb87333cae3b5741ae7 0x1cae7dc29ded632cc759c4eb091cf0ecd08ca5b2 0xdb4a029b9fa6e5ca3e785eafa3c1991a64215204 0xbd8f13f58391c10be820ca5ed265e9dfab57b808 0xdfcd6c66bc65af54a066cadf069c6640cca215c6 0x99b646814ed88989ed09d843e6d1801504d435ad 0xca3d7468dae9b2288f3f451753e25f5e5c542626 0x088c36c3aa5eda6cbb4cf45fdf64586b41ce0bb7 0x9917f00656c8693a68e759c29b1fdd878cbb0ec4 0xc255369ca1b44b57485e0c6dc8c2cf704ceae79e 0xb6f0afe282449d93bc7280a6a3b7cd8c93e8b02a 0x4b7ee1c15aa174611050a6263aee1724a8840ec9 0x0ac76816b9867a53a8c1e8e231c2ba79b9a904d6