ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-BFB5EA292BD4
|
Infrastructure Scan
ADDRESS: 0x424a0db8614f7bec1db4c4909d4d0bb66db5745e
DEPLOYED: 2026-05-09 13:09:35
LAST_TX: 2026-05-09 13:50:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Pulling contract state from Alchemy RPC… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Checking ‘immutable’ variables and constants… [MEM] Simulation buffer: 1024 KB allocated. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Testing edge case: Zero-address transfer… [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Comparing result with Triada-Security-Standard. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x4de34c452bf1d22f3b69f787d589319fae6577b3 0xb0d503d1291d7dba2cfb0c68b53fe01096b24e4f 0xc8933b82d5da7718f4b8d8e2cbcb50394ad636b3 0x018be1472ca5eb3174b36fb0d6eda8b1c48f8588 0x273ff7d8d3b1ef342a6bb805501af8e41845e62a 0xbe80844f0a2708b564a2708311165bb2a54cfa61 0x8e933a67c6cac19497229c4682577ace6be49372 0x3ef527d7f511c201536c9b475df55f7f1b77ff6d 0xd1a540c2a948e49ab0fd703d369d2ea8fe461e59 0x8d4773a1c6523a860d88ffee3ee35d7bb1cfb1b9 0x712f573190eda229dc3f1787eacebb31e1859aca 0x7743e77d31ab441a728b2a381cbc93ef789d436e 0xb6ffcb4760581c64f5f1f3228d0ffd6ce2e40bf0 0xfe2701a4bd5351a1d1451aebea7a52e06e054bdc 0x6bff781f2d65b8fc3955c919bd12c0b92c36d4a3 0xae8149a9c6a6a59e5a6813886123d9bb57dd5091 0x7c4519412080b220ae8f9f44cf16631688dd1874 0x390e76a35793a83b83d40ef0c2c36717511e88ec 0xf59bf2a3d774e877b938bbc34cf751b6d6fb883a 0xb91971cb3aa8779de66fa0ff108c26e070b02540