ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-9BF4D7C6EFA6
|
Infrastructure Scan
ADDRESS: 0xd4c8b0398211b7d203ee862fc903d0d903e8b53a
DEPLOYED: 2026-05-17 19:25:59
LAST_TX: 2026-05-17 20:45:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Synchronizing with block height 99638. [FETCH] Reconstructing ABI from function selectors… [SCAN] Running static analysis on JUMP instructions… [MEM] Simulation buffer: 1024 KB allocated. [VULN] Potential ‘Dos with Gas Limit’ in loops found. [SIM] Mocking MSG.SENDER as 0xfbff4bdae57744a858109d4c2cd27db9eab60441. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] No critical memory leaks during simulation. [DONE] Scan task 0E4ED986 finished in 62s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x1bde864170d1420bf6e348087606b2080864231f 0xd1149674e3efbb3771093a91e53542d03ec6319d 0x64be33b5a11b0b70295a5ab4f354d53d1679235d 0x146e032820a2c7c7d2742413af8603b117f20a6f 0xf2cac9c5ad0fdc13f83dd0bdc8358a13921ee01a 0xffd621cce5c7533208048812dbdf87a4e3f7d56d 0x651388efaffafc87f35513fa7cacf9533707a7fe 0x4c457084aeed4c37a5af59b6b28ac51de19fdd66 0x97e53175d29c3567ee694f7f2374f29fa5a3982a 0x4ad6471954737072810cf68f04b39b7fac9d8c13 0xd9e61fd2f2a366cbbbc3e49320299371374b5cec 0xcc5fba375712ccb7dde2c279a5fa338e7ef6751e 0x5162dd041b524c5ecdfb96a5cf9de4894c75412b 0xdd7a292031bd01a4f858946bf867b9abc295b212 0x0bdf82c83109e49e70e9b0d3f2edd56e36f9d480 0x44b7338d0bb736fa5b40003614a41504a52df38d 0xba0b59d57beb7a8e82b6a3d7c8bcef4523c3746e 0x91f4bc157a2d12d12bf87819c82099fd4c40bc0d 0x404ad48686cb768e5fa0a1f91d565e7a43ac4fc6 0x2923a4237959cea099dd24d6d6561f44b92953f7