ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-6062C608321A
|
Infrastructure Scan
ADDRESS: 0x7a8617b32228382fd2454ef45f859f9c38dec801
DEPLOYED: 2026-05-15 11:54:11
LAST_TX: 2026-05-15 12:30:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Metadata hash (IPFS): 366b8aef…ab465e97… [SCAN] Analyzing visibility: 8 public, 1 private methods. [MEM] Virtual memory mapped: 0x0000 -> 0xe7a8. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Mocking MSG.SENDER as 0x3d21245d079bb7f30da8f4324b97ddd2d19672f1. [TRACE] Call sequence: 75b5 -> 69bd -> df0e. [VALID] Gas optimization score: 68/100. [DONE] Report exported to IPFS: 366b8aef…ab465e97.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xc3a69ddc946dcedcd63feec6b78a7b0ef99ad501 0x1ef2665363fc7adc6f7d829a39e3d4544b2e9e0f 0x12b94f2923395d0bd3dd3ece2b2671004f209a24 0x8a9f07e6fc4f0ac3e89d58b285592f5c38a415f8 0xf4a818d03eb5dfd4bc55d00d3d97ab444cecce7a 0x7c083754788ade01b23a05fd563dec07c23df7a0 0xbde5d2e961fcdfaa7bfeae62e1a510703cf64767 0x978f6628b9c647e4f12526674fc94f6b883fa662 0x6915f246677f6e2b0f691ae33b73cb1b6fa3f3f4 0xb8b8a84f2caf5c145e00f6474768acb6d3b50c2c 0x754795b99af2ff7a18b541e6e093292e2662e62f 0x18d594145159579ec62d90317cd106f9a9f41ddd 0x765b53c4cf355a80b9b758b01f3c830cde8955d6 0x1470ad9abf379d1854fd01a8570aed287f4a9bbf 0xdceab3a7d896929f74e595b4cd4514ec787c7ccf 0x385ceae9ff1d6ab716cb824a17c286c1f5a00b10 0x0a8cd0747d6f859afddca5eeb6ece72a20983d62 0x329ca146cca7fe2c41fecd83059c63c96ff70ec4 0xd7b5ef341794fa0a1f3d1f7ea55447110c86068d 0xcf676a749740d7a3d925cdbc4e10de50e8f086a2