ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-EE91D57FD6CA
|
Infrastructure Scan
ADDRESS: 0x1e5adf70321ca28b3ead70eac545e6055e969e6f
DEPLOYED: 2026-05-11 00:34:11
LAST_TX: 2026-05-12 01:42:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Fetching raw bytecode for 0x1e5adf70321ca28b3ead70eac545e6055e969e6f… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Mapping ownership-protected functions… [MEM] Tracking pointer 0x1d3c935f in memory heap. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Fuzzing input data for 99 iterations. [TRACE] Stack trace saved to /logs/TRD-E9056D9D.log. [VALID] No critical memory leaks during simulation. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x2d42dc9bec6922fc573297ef1f10f4a45a346b3f 0x284dd7fb2810d5ed3f35e1619a2c25bcb7cfdb63 0x474bb1313e84336032b0d8a3680757da7693777f 0x142cbbc4c948053a4101d29c6eccc60ead5ee47d 0x329f66d9846a1a00ada226b2b266b13a30cead24 0xbd7dd77575992d32b0f1fe557be3fc9d07ea0866 0x69a27769ea5622a1de7eaa908a1a8217ffda38af 0x5788be2623977c60309ec77eaefaee9afffaabc2 0xf9e826077dd39d6ae92eab18653239898ecf8afb 0xdb482b8827befe05779ee9f5c052b2a6debe2920 0xa676f08ef323183b20da80aa094ef34b5c0eb6a2 0x40bea9963793dc2d6f6ddc14aa016b3d2b5cdbb6 0xee3be82573e1520dc7e7f3d64219a9764a0af793 0xf18d5a4d447ad91d7f40e4edcfb6b5505ca125cc 0x92abe4fe37e80bfc1a7bc83d39c35d527d6cd335 0xcbd704ba10e617a88ba4154d072c01a78874e50a 0xc789031c7972ac609d2e9392f61b9bd203b7840a 0x168d3e95c2696c0c1d31774d60c7cc14e9a7f2c2 0x78e4bfc5590951d30db2db45a8e742c1723305fa 0x372c834a6f251fa98da79471bb9c988ddd448268
