ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-BBE39A446E19
Infrastructure Scan ADDRESS: 0x4c80a5435bfc2cbb79a31e92f0d077320db84971 DEPLOYED: 2026-05-11 23:23:11 LAST_TX: 2026-05-14 04:53:23 | Compliance Status STATUS: OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover VISIBILITY: DEBUG_INTERFACE_EXPOSED |
◈ OWNER_PRIVILEGE_EXPOSURE An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! | > Execution_Trace_Log [SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Hex dump completed. Entropy: 1.61 bit/byte. [SCAN] Running static analysis on JUMP instructions… [MEM] Tracking pointer 0x739442f9 in memory heap. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Simulation completed. No state corruption detected. [TRACE] Bytecode segment 0x15 analysed. [VALID] Finalizing audit report for 0x4c80a5435bfc2cbb79a31e92f0d077320db84971. [DONE] Memory buffer cleared. Session closed. |
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x1cecd2baad6f42a0e5731dbb02ed0c32952a77b3 0x6128d25c1962281672ed9e1584282fa7178586a2 0xd83858aaca78a875b4e9c55fa99c0f07a1e38e64 0xa3b347a8bb426460594d7f9bc809689b3a406ac5 0x41c0e33dd40813b1ac582bddd43b4f7c6bf397c7 0xda832e3b50e5777b5c18d2d3d215c9aca7f7163f 0xaedf0b1951534b76305a43d3c5ae2b32f5d40a59 0x1d7702f4dcfae6b41b45bff428f75434fec4d3a1 0x4702aa437a476a540501b5ffbb5bb3bf9781a6be 0xaa4966eb805130e4b322d30a66f234da8f16be71 0x088fd82ce98b38adff1ae989597c55260fa41743 0x0c1b7a6015b4635e085aa1d8ab0a769fd6e4e4f5 0x12c70aaf7d00dc56d3f9a4a6b666155f37537373 0xc2a22472bb66e21f42515bb2b04903636e5a69e5 0xeed12871dcd055ebe1bb0a1cbe1bb641e274183d 0x51a56a00dba8c4cf3d4f3aaa335ab8ad4c4bcea3 0xa991670fd2ede563016490261227c7cd49fb10ae 0x3a258f356373a12d92ba00673eb1215914811712 0xd6d62e400c48570a972635bf4b878ba00fda1c7e 0xbed17694375eef813c649171852a9ecb767d978b