ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-892B9AB2B31F
|
Infrastructure Scan
ADDRESS: 0x29bbace690d8f70dd161fcafcc2f028f49131bcd
DEPLOYED: 2026-05-08 01:50:11
LAST_TX: 2026-05-08 02:19:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 18C523EC. [NET] Connection established. Peer count: 49. [FETCH] Metadata hash (IPFS): ff2daeeb…c8abfc0b… [SCAN] Checking ‘immutable’ variables and constants… [MEM] Tracking pointer 0x2a0165df in memory heap. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Mocking MSG.SENDER as 0x5a7439a457fb09040de44455a3572ba697c4d97f. [TRACE] Execution path: 82% coverage. [VALID] No critical memory leaks during simulation. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x700b687cf9fd94e7970a4c2e693c73cf35537c6a 0xfaca48816da653c84006fe33163261400e0b6fac 0x940dfa5581a99dc9fbbe7d4c33535bf9dec05dab 0xc31ced6a2ddcc0bbb20d2d419ef6c50f0eb4ea2a 0x8118b116773c38ce18486a4f2d5d53028a558ed6 0x71de91e0076333b5a135c9dca2901eabdde3582d 0x9869de82ce8c3050aecf65daaf0e735bdbf2a3be 0x13b34350e5108f37e9d09a5d4a98537da1b9d194 0xa3916655f95c7a8589bbd0363c7e669a238b0ef1 0x91b618e06fdcbcf70a3d355270aa570dec4b1033 0x63a62941cce0e4dcbba580202a2a2d3b66be43b4 0x4afc6be967143d92dcf7a6a614dbc5afd01283bf 0xa12e305352a9479fce4844e6a91146908c010628 0xf729ef4be7aa124e9d8c093d4c7e2a19378b549d 0xdcfe860982496a25a83e494aef1af501929f7de7 0x4784149f61c0404ff21c9edcb00999ec60af6952 0xa52114d68574c294db369239c7e754e1356d27d1 0x37031be3572b01b250c363c9fa10c83e685e85f1 0x7a3c5568c1f0804e1ac7942575c1141c977997d0 0xfa58070dbf1239b948c1ea8f69c392cd81fae665
