ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-FDEF39950B45
|
Infrastructure Scan
ADDRESS: 0x4c80a5435bfc2cbb79a31e92f0d077320db84971
DEPLOYED: 2026-05-11 23:23:11
LAST_TX: 2026-05-14 05:54:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Synchronizing with block height 43925. [FETCH] Entry point found at offset 0x2350. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Tracking pointer 0x30199bbc in memory heap. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] State change detected in slot 0x9e. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Data integrity: SHA256 verified. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x1870ccad9b9706861f9112c0e699c90db54c957c 0x967ddf0a0e3bddae0e55ea29f7688e63279aded5 0xd6856a43e60f1bd44d2d18d1ac936c0ca84974a2 0xfea3fba96cbcd7ce2f10b1a1b6bf1d73e8dd5e04 0xfdd9455fd1d786752388cd7acfaf8d26d790b783 0x71aeaff47242c53f6fb23e993a810941d5ac95c9 0x2b740bbb30711a57d56022a91f0814b1f57f27cd 0x96b657865838be9d747fe41abc283ce8dcdd05f9 0x03fdba0eb64d12cc91fa3c0a20a2e9988df6be0d 0xaba0b5f99f982271a7ce5af7d3dcb26cdb432eaa 0x4c41e1749d0ce43b70ce4e8399e75bfeadc3ca57 0x5904c2786f941b8d519f58fcad4f0e80297d41f1 0x261d8cf7eea5cd050e4d93c8d836726dcca386c6 0x9fabcf8fd9343728e2acef88cc3c39101c46c1f2 0x9e034939a18a5c4e75a8a44a0cabb259a6739296 0x0604230baaa97ea3d28d8ed0ba9dd796ba89df96 0x9c850771b321c6e7aa909413b5cc98c86ccba96f 0xec4103cea51453697c3caf3c6ac9b818fe7b8ff3 0xe3ef5b13ce5a94abe56fc2800a26910ae0a4ac89 0x7690d4828aeba7986026e6b4bb2520c72d4f73d0