ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-409CDD723CFB
|
Infrastructure Scan
ADDRESS: 0x5822b5c3473c9a685591509f26712cfd2fec3342
DEPLOYED: 2026-04-28 02:35:59
LAST_TX: 2026-04-28 04:15:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connection established. Peer count: 29. [FETCH] Metadata hash (IPFS): d111b537…28734564… [SCAN] Identifying function signatures (0x255871fe). [MEM] Snapshotting EVM state before execution… [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Balance check: 7.99 ETH. [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Generating cryptographic proof of scan… [DONE] Scan task 621DDE1E finished in 91s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xa3110d4766a01956193af15b21de8fd75ce0fce6 0x09762ebe915fc861f591feb6810ac8772497a8be 0xfb2a8cfd595d93a6db67494b5e7121d1166a559b 0xd373a28770cd0664fd16795f4331c290eb5964ed 0x54bb5b4b9c47c0dbb4fd226309c65ee75c70e0d3 0x3dafac1c3fdb121afbc54316fd96d8ce53d14e5a 0x2c4dfa1ac5ae76485cf3ecb6777fe6cb7b1bd5d7 0x3fd6e1867a5f7d95f84b62b49b7e767000acc3a4 0xb7ade1b4b59facf78ab88d9f31874caa74d8f934 0xf64645dddbbb16984c51108bfba08f9acba5538d 0x116357745b5cae8f01b5748d0d2ffb92e041613f 0x18a330ce0f733b5bfb16195a10b8b1f73fe8c7b6 0x920b531a3c737e3f1d47271fbf00b762b2eef976 0xc4b458010b1de699815f435de56afceb52f2e5c4 0x58142bde248c330ee429db825045a3f1ad8a7f32 0x4d13ed63be8b06db81169a3da898170b1f6ac209 0x580d0b5f1b88a7e06317ee60ec45e2103459fbe0 0xdaa9bb998831ff94912c63bc006449ea1cb316ad 0x48770a789fc85d3e4ca28aa9e99fa884304074e7 0xe8e429c40f76ea2b67179ea36be0204623533ca7
