ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-E47D96ABCD09
|
Infrastructure Scan
ADDRESS: 0x6023f95a5a307d8264011915246ed6828fdd7398
DEPLOYED: 2026-04-27 10:17:59
LAST_TX: 2026-04-30 12:26:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Pulling contract state from Alchemy RPC… [FETCH] Hex dump completed. Entropy: 9.21 bit/byte. [SCAN] Detecting compiler version: v0.8.59. [MEM] Virtual memory mapped: 0x0000 -> 0x8c48. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Mocking MSG.SENDER as 0x098e4928eb1a48da48b3c80828f7b10a6f3391cb. [TRACE] Return data: 0x9f94be72… [VALID] Security status: DEEP_CORE scan finished. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xc59771cba11e5a363373adb156ffeb18a33c7d19 0x31eff4e88f390d95c1f848e382eb931377da0b80 0x1ffd48f510ee54f13eede629de9c5b8caac54b37 0xed16647144c099e3ef5b60a6714c5c42e15f61bb 0xc1c78625fe9c95a149923509f692bcd68db5b864 0x33e09f8fb85cb5c7deaaccd961d6c9f3cdd25a6f 0xf3afa12c14762720618be7b909438a3a19c78f9b 0x80b86c23b113a00ae9b463e740eebb5739ae87a9 0xffb60652b4c5bca2fba27962cc80b98d3387b80c 0x219a4532dd7691e43a52aeeef4532a8beb8a1211 0x0c2e21baa3e43b205f9eef86d4fb936b81bf6ad8 0x51fd501d1d866177e209eaa357c515578df1c766 0x64f64ed97e240e644a5926afbe95cf9bfda6ec3f 0x507182e3ebacfc0ee116ce0dc1b5dc768eb15245 0xd63540cd4fbf961393b7156962f453b45c014075 0xdc049324a1b9baf692890817a80c0bc2c4e7f841 0xefcca47541c1d17b075f97289907117b870c85b0 0x8357f80146c2b7c9b556297566f6798a3ec509b1 0x8333cf74eb3d06d6b8ca21def23e48e0652e162b 0x9397a1bf0580bffccc6f25417659584f4c66da3b
