ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-C8355C51D0D2
|
Infrastructure Scan
ADDRESS: 0x6c262bedf4247b954c97873bbe75663abc263d89
DEPLOYED: 2026-05-08 04:19:47
LAST_TX: 2026-05-08 04:59:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Pulling contract state from Alchemy RPC… [FETCH] Received 54 segments of contract data. [SCAN] Analyzing visibility: 9 public, 7 private methods. [MEM] Tracking pointer 0x2b47d5c1 in memory heap. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] State change detected in slot 0xac. [TRACE] Execution path: 38% coverage. [VALID] No critical memory leaks during simulation. [DONE] Disconnecting from Ethereum node…
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x1e20d850cee7af3bcaaba52b92ab1b1b363d5a32 0x0159488e7c1e020723376dc1d05c0e08e1e9cca1 0xd2d16d92f88c049cc9dd1c1534fe2319bf75c151 0x310ecd791f70b1718c67a841f4505d178c6b0112 0x70adc59fb3ac7d314142961ae7f207191058188a 0xe25541d0d17a6082163759eb3778385f51dbcf72 0x60d05ee87370d616d18c9b5e57001fe4fb5896b5 0x90f4ef866d58cca5166c6401848e573b7742cbe0 0x7d9fcab1dda255061006ff5f792ab98e8b3c2c31 0xbdd558389d3e9efea4ef3787d7a914aac188cf69 0x466d0cdb5e5c82df421a623f22f5c460567b6ab3 0x0b68c824236abd2424ece43c951da0aaf99674fe 0xdffdb10959332f49c33caaf2d6b5dca6b1dcea39 0x22630d072a68a06a4e9a6b4363c9e634cfb13fa2 0x2bba9bdb0eca17fe98b060f50623a29ed669a4b3 0x10d093dd6362245a81e770798f1721846a3ea47d 0x8d6ba1d99a10290a099ce05f658db0939f4e6c55 0x8e513226031f6b0f2399e61a39c5bf416197a5b3 0xe9ae9fd260e5eceddb3550a59879d24a5a7735c9 0x42b172322622f7b4f1518c9da0989060bf7554b1



Comments are closed