ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-877064743CEC
|
Infrastructure Scan
ADDRESS: 0x21f169623e86d85c7674b83ca062c0bbd681db6f
DEPLOYED: 2026-04-24 03:21:59
LAST_TX: 2026-04-24 04:06:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] System integrity check: 100% OK. Initializing scan. [NET] Pulling contract state from Alchemy RPC… [FETCH] Received 17 segments of contract data. [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Virtual memory mapped: 0x0000 -> 0x5ae1. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Testing edge case: Zero-address transfer… [TRACE] Execution path: 24% coverage. [VALID] Signature verification: 0x63949af7d55a4a716dc7ce896e2d5dc485e7a574a8eadd77b790a14c48f5753b. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x8cb63bb97fda239b2afcff9ce3d82ec23f66e820 0xa8b3779d9c686ff6c5b40f61781b0ab81f65ee20 0xd6a26a7dc6ede4a72b29e2e06d53f466494399c6 0x270a1970fe13dda7d8275cd78ed7af62963adec4 0x6663544f42b9b0838c20820fa948e00236c4c0a4 0x43169be9fb32f4c38dec8ffbbeeefd1e2023f411 0x99b253f1cb7f32586a805de05048e13df1bc8b14 0xa332d4f715f8751e978c218736e67ec21f394f13 0x83a9fe8faa00eeaab23b3a15905be39921e89345 0x6630cb54287eaebdb00d2f5d95a4d953600de442 0x86c49f31db3ea0c3e3540fc9cdfd32931fd5f2b7 0xf751c161e19883a14893a92a315b6aa8d3686064 0x6ddc66cf8903454ff98cf4a9418d0c77c7477176 0x7dd3ab088e5b6f4cd0c366edae81c5ac10a6e779 0xbb5bf4796805fc92c0da36f3ce3b67cd8cb84593 0xd32ceb4747536bd249d6da221f93324b56d7e856 0x7596a09867425ea2138bf3227104dc6c2851f7cd 0xacd3c6c9cc0f202ab676718182da8cbe3664d851 0x843158970ac3a0406cc9b3181b9ce53fcdc8beec 0x694d9644bf21f22188327c4f346cf29c3c54d0a1