ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-1D472984A5CA
|
Infrastructure Scan
ADDRESS: 0xc70bd7f0c8d5b0136f9c90e5165716c86cf2cfaa
DEPLOYED: 2026-04-24 14:09:11
LAST_TX: 2026-04-24 15:11:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: F8633218. [NET] Handshake with node 0x4ffc1522 successful. [FETCH] Reconstructing ABI from function selectors… [SCAN] Running static analysis on JUMP instructions… [MEM] Snapshotting EVM state before execution… [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Fuzzing input data for 36 iterations. [TRACE] Bytecode segment 0xbd analysed. [VALID] No critical memory leaks during simulation. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x3951185bfdf8b714737bc4c476625a70fd5fe133 0xc474cf8351aaefed5d2b1184d304010461f51046 0x7b9f36a2f331ece03a7483d2713cfd806f9beef2 0xd6659a3cb77b7c7d05e9c066482d7411b5d0ae25 0xfd0e9c05ad45cbb999246c9cdb81c29dfcbe8708 0xca25a07738baa1686a35658b63cb074d264eaffa 0xa8f8cc0a2004570c4689d27e620ceb60b3a68bce 0x6a73760623d06e6fd93da364367357f3cc656f73 0x3f3f2d8b6167a80756e6c071c95b54a00a6cf3ad 0x3bf3ced4bb3f34bfb687a57450b405bb0cbaa5b7 0x9398a357fb829c9179f239b1726ead5388780daf 0x7bd834039eabe9491d8468cd9b9577aede45b44b 0x716984f5a3638c3075fc837248c2981170ec7396 0xe94eddf299a1f55137f5c6fb597c68653cf323cd 0x8df4dc2f7a8fdf532af97ae9c0edc7725cad44b5 0x7d0ec2594ae8ea81e0957e2008760dd70a29e860 0x7c8400cc5dbb7ad57f79bc3e3f1f92b19a0a586d 0xe746e0d0fad434db9e41121980610ed273a65eec 0x184c87670a8b96e68effbf18f7f3e3a44cc18560 0x8bb70b95c7a05b88b2ab5caf5fdb2ed221ebb44c
