ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-87247CF77974
|
Infrastructure Scan
ADDRESS: 0xc678ce8485b0063d417fc21b18230a6035b25340
DEPLOYED: 2026-04-25 18:37:11
LAST_TX: 2026-04-30 10:29:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Pulling contract state from Alchemy RPC… [FETCH] Bytecode size: 7194 bytes. [SCAN] Mapping internal logic flow and branching. [MEM] Stack depth: 1 / 1024. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Mocking MSG.SENDER as 0x06a9dfe7e7cfece9d54ae58dba6d85bcab2d2f12. [TRACE] Bytecode segment 0xc4 analysed. [VALID] No critical memory leaks during simulation. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x7c1dfe6b219ed295fcff9981a68bcd15ada3e97a 0x3fa33c3cf57ebf97545e56f118432b9e49da2f38 0x87c2403dbac20ce5cc11ad3ae83be70ca256a470 0x33b5e31553ed4572fb211f70c53d6fe468cb8468 0xaa8b1a35a8c65236c3e3ce27d13342a7c4a16024 0x915b118cb4b2b62b20426733b5aecd63c70e6b3c 0xca20b592b00eaa3d4aa11b769c7cd851ca305d9b 0x3fb7ee7b49f47cfb71fce57e3f8823ad677338b8 0x7ab9cdfffa48385f498ed398fb933d34a593dfd8 0x684733dd5b2af8067f93974ec7efe590db5491e1 0x786ef30913ab1e1dbb1a5efbd417dc0f72e4d0b3 0x9dad478f2a7f58dbb442cd7e8bdbc820ab552e47 0xb0603b41f27f0bfefb7b7bc28ce158414df63637 0xd92095a3d1eb5e334b7082848452e5653ff718ac 0xf1e9a3cca93281b3c378f7a14da4f62c2cfefb20 0x33a4e5882806979c7b8fd895e6698903b48eeab3 0x96e571aac2253e7bc8af12799f7dbdb3f24829cb 0x9f5872f90111c0c1935b8467adfca3176c322ca7 0x46e65ae8f0954e7d2e127ff1d15be3242a7325d1 0xc08eb9b8e903e2644bf67f089781051ff2a88007
Categories: Uncategorized