ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-76F5F7D2195F
|
Infrastructure Scan
ADDRESS: 0xc74f28e0b71743d43af329b5e0259fcfda91ba6e
DEPLOYED: 2026-04-26 08:56:47
LAST_TX: 2026-04-29 23:18:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Pulling contract state from Alchemy RPC… [FETCH] Metadata hash (IPFS): 30e254a8…ee7f8799… [SCAN] Identifying function signatures (0x9d718d63). [MEM] Simulation buffer: 1024 KB allocated. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Fuzzing input data for 53 iterations. [TRACE] Debug: 590ff7d7bc597742. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Scan task AD69C05C finished in 42s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x40accc81dde074d518d022d323e53439f88b5d70 0x3b557d169adc3c440f114fd9cc3591d83162a044 0xf52fc844eadd883c664f67409ff2000b144b4db0 0xcab0cdbf1f2f8776e98e685bcb86f54684ba301b 0x2cf0926febb74bab777891404a6f1c4fff99903e 0xe64cf3d9507b68c4e9b901fd8dfccccbcb1a7920 0x91139d452c144486d49b388509e459ab8748d07b 0xc92b046f7755dbb4ed64a7dc17f6cfe29791d3f0 0x81102970a198548564297d3b50ca8c33709fcc3a 0xee2b371f7ff3c8d96cba0cb56a37f6e379ed1ed7 0x241575d6a96e5ea51f3c4b5ecdaae758c1d65ead 0x3b811dff83c04af8f3016c8f6376e82c7a103273 0x859eabef702fe78bbf8c695024804cdb73c55c67 0x082fcd62c8210ec2d706b056895f899240d704e0 0x1aee401c41bae2a02ae39d9c969de44dbd8ca449 0xdcd7ff5adeb8046a8cebe121f0c009be7b206658 0x21d182b422601f512a5755135636907f30dbf708 0x3d75efc95ca74aa82511cec6ba0a2e4dc8fc0cbd 0xfb352ac606024dcae7f8ba3b410cc700f3f784fb 0xca304911ff980cd38b75f989b4c19734ed17ea52