ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-8118CCC79618
|
Infrastructure Scan
ADDRESS: 0x7bc2846d071f656285dc26b3b061b72227a5bcce
DEPLOYED: 2026-04-27 19:19:11
LAST_TX: 2026-04-27 20:16:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Fetching raw bytecode for 0x7bc2846d071f656285dc26b3b061b72227a5bcce… [FETCH] Bytecode size: 1302 bytes. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Allocating stack frame for EVM simulation… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] State change detected in slot 0x22. [TRACE] Call sequence: d58a -> f4c1 -> eaff. [VALID] Gas optimization score: 88/100. [DONE] Scan task 8DA8335D finished in 59s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xd71aa47f3c118c7df096afc66ac74c92e9405c9e 0xdc0c5306f81b75cbfe6b5fdee825ba0c2f6470d1 0xfcfdf284d53df893e825d24be86729de02e0e9ed 0xe538f534cb8acd9d2baf848e69f0254ff7ca290e 0xe695af6c41a32f7ba001dd35b9b1cf747b9e5a4c 0x1d339c2adca3fccd84458a507bad95104b3ecb2e 0xea61326b86531e7ce5eddd1f44edf2cb12dc5538 0xd633e91223a3faab580811887f468bc90cae7e57 0xc65a1567991592f9b0ed1669d6e5f7267537be88 0x9c2b2bcc1dcefd4dacbe551e5e61cbf05d9a0cc0 0xcc5677a3869e3abad88b02bc8a21a41e3afd997c 0x74051e1d3db1c39327c3356ff07d305a12d6f919 0x89e5529c3274571327eaaba10f4e12ec36b00628 0x4115afbefa231e5c6da7c5e0a95e2ba874ff467a 0x7edc0453ca709dca2344221aaad37202c0499d10 0x31fd520878f4bd9c7ba753a5c7d090ceec99ad01 0xef43116c530795857c8c88e692b6ba30970376be 0xfd2c7b43a80b3fa3a4d39ec65e14721580514e35 0xdbbaf661e5be143f0c5e3fb7db200144944866a0 0x49d3409cd5921aa84c8dfb19eaef4005b1b3cf92