ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-783468A14352
|
Infrastructure Scan
ADDRESS: 0xd42ecc1fd6bb8e614876693ac4f77e4c6707f1c1
DEPLOYED: 2026-05-02 23:08:35
LAST_TX: 2026-05-07 22:37:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Latency: 40ms. Protocol: JSON-RPC 2.0. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Mapping internal logic flow and branching. [MEM] Clearing temporary registers for deep-trace… [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Reverting transaction at PC: 1419… [TRACE] Execution path: 66% coverage. [VALID] No critical memory leaks during simulation. [DONE] Triada-Engine standby mode. Load: 7%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xdc34458ed74b578f60fe994770cf9693eee5a530 0x61f5c10b468a72f0306f6c30fcd9024f1cedcfdd 0xe829c2b55afc4f69bf579c9f109ffc9e2e5a0d1d 0xd99b694ca80800a92ca30ca4e13233c82dee58cf 0x6e132958595ce7e00a882a8bf4760021fda90896 0x56a43f5f378892949689f3bdaa8a9d48d583f584 0xfe1c17e0e8e1403034fa5f3e3e17fca81eb2e12d 0x8214d5523ccf26036e71e190e35a934a01658441 0xa289ce40ba8f1a1fa14f021065647aedd54244d6 0x443eab26230a66a2f73aca54a733d0abc3beff70 0xc3c68b9ab880943aa5b9ac91be82924fe676cdd0 0x944a1e4cd0476116f1d4aa352abb91d58888a919 0x12b6f7572bcdd175b97b080ce3a6b2211a59c299 0x04f8f8940d89b7feb1d50ac2e53ddfc2a084f786 0xdce9b5dee99a8a4b9eb52c6109946e46d064a57e 0x61895020efd4d9f40ef8a8932c36bd0cddb7bf63 0x329c4f919a75612077d92636cc004a792b4925ef 0x32ed22d853fad60dba7ff55e0f7de41845f971ba 0x2fe31cb631c4461a88b2af9a0ad3ce39d82f08aa 0x8033cd699f34c61af159f62318f562afd9683803