ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-8AE81508C8ED
|
Infrastructure Scan
ADDRESS: 0xd147dd805a0cfebf6fcfef460e0c4c716320ad47
DEPLOYED: 2026-05-08 22:08:11
LAST_TX: 2026-05-10 09:45:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Synchronizing with block height 81130. [FETCH] Entry point found at offset 0xfe9b. [SCAN] Checking ‘immutable’ variables and constants… [MEM] Initializing storage slot tracker… [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Mocking MSG.SENDER as 0xe4d86ca10586dadc08fcf6e5bf002f6c283b835e. [TRACE] Call sequence: f8bf -> ba8e -> 70f9. [VALID] No critical memory leaks during simulation. [DONE] Log signature: 71e0953e8aec0878187103466c2137fd698f5544cce8d9fe17042e85f12731b2.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x909b40c28f1ace3cae1a6fdb099e2c06e3f7a7ab 0x3c6124612cdf153a5f4a662852af157113e38868 0x660e5bd52c1be2b078ec886ea2463c9b2ba5feb8 0x44f56bc958d95421946abfd9fc4ee61e857717e7 0xd6e286614cbbefff08d9633f87276de5d7b5de3d 0x99d9f10ca8de708f2ea40b2a96590d638357fde6 0xcd6996277b53c658f605e9679fb755b5d621d3ff 0x48987b14b086e3057b2a5c45a6850ee97b9f91f1 0xf9da2c7763d59deb3ef9b8fc17801de8de6e797a 0xcf06a4a021ec4d3764ac4172cdfa71d6e6935612 0xe3b57321066838234eaa16b7f2112fecdbb9455a 0x6e2f3f0d46ed29afe042763594fe372b8385658b 0x160f2859d667f68ac49279c235f073608f66d838 0x395a53e21cda120988c2eaa6941fb7b0965e9529 0x715a5a71a92c6f737b32c8edb8d858f8da4631ed 0xc9e3d30979813317d5213d5dd4ca2f5fb9e0d242 0x9f88029c36b0aabe30661d31939d1667754faa46 0x11881f5430c9423a70eeee5d5a7bf8ab14bcef32 0x6e79989396a8e2739e59dad025e12126275b4eab 0x3de39d391057f417210a461a850716dc2c42741c