ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-C57A99BC7388
|
Infrastructure Scan
ADDRESS: 0x26b776e6200a2b994d7ad8f3a02fea64231572e4
DEPLOYED: 2026-05-13 15:00:47
LAST_TX: 2026-05-14 11:06:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Fetching raw bytecode for 0x26b776e6200a2b994d7ad8f3a02fea64231572e4… [FETCH] Entry point found at offset 0x6485. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Clearing temporary registers for deep-trace… [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Mocking MSG.SENDER as 0xee0bc376b68cc7a341e988aa7533e80dbebe91ef. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Generating cryptographic proof of scan… [DONE] Report exported to IPFS: b190ebaa…c0268c57.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xdd895a6c0c1553ed2c3f83cf938f0c706f9a8ee0 0x1ee601c302b310d133f6e0a1760c806374294df0 0x7b2d4142ee48b9ccd4c222cefb681ad4b71c3f2b 0x6b64904d601aeefad25db175e54712f85a482c6d 0xa98e81af183ddbd32a548769b0b4adeaad6ecbb4 0xd28e335dfec4a5e121f6c268450fd9756f505786 0x9c447fb90a07d45bb61124d739f1d03e7d6c0b80 0x81002b67a6076847236ea47a0c37103ec8578b4f 0x925d45c926f097843957eed06e9d0ae57d85e094 0xd2f33cbb39303c9c5f424edf9989edbb1b5bf8c1 0x157416cdcb91648454ed3e8bfe49cf248b9cdf67 0x5f1b8dbd3135c444f9b016f9fa19738e6b98a9b5 0x4fa60e9262eef0360af11583cfe8a4b1719d3f2e 0x81bb05904e3102b4312f855ccee48904deaa0a7c 0x954c8ad0e8ed4bcec645baa6b8ffe77605ba583c 0xb9e720eb4b147024c41dd2dabee5b495277859e7 0x06eb6ff95c3e973f61fceba13c5bd9f8c46bebb7 0x270312d3c9255407123e007dfd181e8f57a4e9af 0x7afc83372eae02fb975093fe1030935f1b6f94be 0x8cddaea26abced13159d0938ad350f28f9787050