ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-98F285FD87D9
|
Infrastructure Scan
ADDRESS: 0x64ee3f55732d280c2e0cf9ec23140e96698903fd
DEPLOYED: 2026-05-09 23:27:35
LAST_TX: 2026-05-10 00:06:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Successfully retrieved runtime code from blockchain. [SCAN] Searching for ‚DELEGATECALL‘ and ‚SELFDESTRUCT‘ patterns. [MEM] Virtual memory mapped: 0x0000 -> 0xf74e. [VULN] Investigating ‚Unchecked low-level calls’… [SIM] State change detected in slot 0x21. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Generating cryptographic proof of scan… [DONE] Scan task 8474FF7B finished in 81s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xd7f08046123a2855f2469a13aeb66f989ec4dddb 0x0c2db9d251d3c01430539b4916a70a4a4c3de64a 0xca8facf642f83a6f5297277624d1766f33657310 0x9f6ce861346ab7063d3165b1e98335eba2319770 0xf70aa16f712c2e6502135ed8f56fbff96009ebc6 0xb8be378f7ddfa1e7b1d5eabf2208fc9572453a5b 0x75662f832001c4750a5196cfe43e1d718a310675 0xb42dbcc5f999e4a67c31578a4be9521b9e4f97ed 0xdd109d72c9fa6cd0a493aea83b0daf36c523b9c2 0x7936b4b8edc1810339036a6becf9150484360aa5 0xdd52f8134f85f3979fba24387ce0cec05937259e 0x0a4581c9b8dcec70e81257bd612b1e6d042084af 0x38889dafcc5c8ce8f62522e650cb76d958bca912 0xb9767335a50372f93bea26fcb40709a3162668fc 0xfe936bc04a94b1a96a45cc1c8ff786ec403f21f7 0xcfb1e50fd5c80b61a8ff05b9648f80dc0dc3d474 0xd2c70780c78717c911e3ea10c2b5c6e65e6af683 0x724493af718f002df45f7b9631a9f44397ed57f3 0xdbef7ff9ff557c7db804dd45c8715fffafc11803 0x6012dffd07b3bedd0e8cf59a8117d66fb49f261f
