ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-363DF41E1029
|
Infrastructure Scan
ADDRESS: 0xb91339a885cadf33c7d001726aca1398cabccae3
DEPLOYED: 2026-04-26 09:34:11
LAST_TX: 2026-04-26 09:49:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 0B1D9FFF. [NET] Fetching raw bytecode for 0xb91339a885cadf33c7d001726aca1398cabccae3… [FETCH] Bytecode size: 3154 bytes. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Tracking pointer 0x35d2af2d in memory heap. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Verifying ‘require’ statements integrity. [TRACE] Call sequence: 4643 -> b15c -> 89c5. [VALID] Finalizing audit report for 0xb91339a885cadf33c7d001726aca1398cabccae3. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xed334d82ede7fdd54ff28440b5ba9f2526fae541 0xe64cf3d9507b68c4e9b901fd8dfccccbcb1a7920 0xd4d6dead84a9d94b375e3670dc47ed8320d53a71 0x6630cb54287eaebdb00d2f5d95a4d953600de442 0xc1ff066cd3b97b99a5d7449616450f76bda4f1a8 0xa9bd20df04822b8d5ffa242a53f746b96994fddc 0xc7e4254a72169fdf7a2e080462724f2f642daf7e 0x93afb8d5a0f6d6d89293b87d4503ae95d4c64918 0xb6279f4b44f417ccd662f0f967c0278e22841978 0x394e960320c73f1d8e2dedb56b21752d7f754f42 0x902d2cb35dcccd44a416b43e991468b2b417df53 0x006c806d316ff3cbcd6ecf7eaf2a7dfd18c00c2e 0x2f8cbe0bb5af16ff987fa30b41205cb9050d61a5 0xacc66dc8f8995eede812a55e49c8ed2747a3a2dd 0x6f9765f7ab69566d0eaae3d6d30b7a4ea38f78c7 0x7bb5d04a2081bcd0cadac5849542294f2928c3c5 0x3f629266f711e63d1bcf9f80f042750bf9934a3c 0xd8c99f2b8af2fcca141e0c741f3e2232e3cfb701 0x2e8f3903dc4e4d7230201ccda94284ee2a4a68a7 0xd8d86ac030106e49909ecf0c156ef43ffed5a939
