ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-150D807A2E71
|
Infrastructure Scan
ADDRESS: 0xca0626917cc79fb22a87fb2eeb76076ecda073b4
DEPLOYED: 2026-05-08 05:55:11
LAST_TX: 2026-05-08 13:29:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Pulling contract state from Alchemy RPC… [FETCH] Entry point found at offset 0x2000. [SCAN] Running static analysis on JUMP instructions… [MEM] Clearing temporary registers for deep-trace… [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Fuzzing input data for 11 iterations. [TRACE] Call sequence: 9683 -> 3acb -> bafe. [VALID] Security status: DEEP_CORE scan finished. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x68898f5e1bd3ce2b6eeaf4698615be0d25d60d25 0xa1f8271c8c97cca9b6e987106ebbbdd9a57d44c5 0x186c55406b1e0807e5ce2ac2ca4ffe79fd16951f 0x3efe5f5bcff70e9882f3b4526073ae88e71d0800 0x3b704fa9f0fcc2605f37520324d7ef5b3328bb43 0x39b64ac8f34bd92e35a6a805f25bd4822473f974 0x588b866af818369f897090f3009b0eb030372797 0x38670ac70adb85b8ac4425a8ae54b080f228eef1 0xcdc94e934efa33b54a99f004e62ecc75caeca515 0x4ca0b7d58e01d5c8b70d4721e0c0e5b41c257104 0xe801c9594d27fb9235c83fd7ef7a4631c5049381 0xc460ca42d2a8edc3763461ec17339f4c3e72188a 0x92c77fd654c0807bd9af20d2afe60d518322c9bc 0x1b6bd763fed6c170f0d177710a59297eb858ee94 0x943a421a7ad6f21c96b754693f0b0097ac79c255 0xf813abbe16f4763d0db9a6bf613f2585c574239a 0xe122e3dd77ac7bd4c78a3b1955504aea2f089656 0xac4eb51b77856fe3f3c8e128cdbaac8993ede03d 0xa7e78ca8ecfa9a796dc28384fd3bcb26e476ff32 0xcd695c0c89bcc5597756f6b27ed7dca911096870
