ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-0D2EF5EF2CA5
|
Infrastructure Scan
ADDRESS: 0xf39039721bcfabb28f7b5569748bee401095d03e
DEPLOYED: 2026-04-29 16:23:59
LAST_TX: 2026-04-29 16:39:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Pulling contract state from Alchemy RPC… [FETCH] Successfully retrieved runtime code from blockchain. [SCAN] Detecting compiler version: v0.8.55. [MEM] Tracking pointer 0x96eee35c in memory heap. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] State change detected in slot 0xd7. [TRACE] Execution path: 24% coverage. [VALID] Data integrity: SHA256 verified. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xc8855e6051f895d0a0211f1fb9ad87dc577bd9b3 0x58142bde248c330ee429db825045a3f1ad8a7f32 0x3405e69dc72d2ce108cd15af82362e67d32994d7 0x4aa6117ab50f9d347bdb4aca3400a70375be2652 0xa85f6ad1115e744a8c13887e361970eb6670b6a9 0x4e875ff8e90dc4b0c2197929c48f2b52ad813900 0x9b14b66e1d4995cc1df547aca7b7563316ec7588 0xa31c844b0c2f6830cb26a17da51e11edcda66a5d 0xcf4a3f6f08a18f9aa10e7d9246e981a2fa55036d 0xf0baf6bde9b8be50d815de736e45c299bf91e94c 0x01684b0c6215fb4127fb8fc272b9272efb171f47 0x43280300bacffb0a174d82438c9b59cf85daa783 0x072932d181262402ab3e0e3e1033cac29c3ed845 0x073bc40397d55e3e786aa29a7da2bf68fac4a14f 0x20b059ce97a3c154c9724fe2a80c60891dccbd8f 0xa3d4f5bac9894cf067ceb7ddab86231a7fcc6d42 0x64876ec4bb025947fb1e0010ba60fe21715df332 0x4da17ee0f0030bba1e444169ff67ac09656bb0db 0x13083822f6b50179e841788fb67f0c2d6e308ae0 0xaf82ad3b86c0a0a20202a2d2700dc09d28b7ed85