ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-8A5A5163D4BD
|
Infrastructure Scan
ADDRESS: 0xd3c86c15c5751d35031fc05708dfa244f99b07be
DEPLOYED: 2026-05-13 12:57:47
LAST_TX: 2026-05-13 17:10:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Latency: 91ms. Protocol: JSON-RPC 2.0. [FETCH] Entry point found at offset 0xe223. [SCAN] Analyzing visibility: 4 public, 9 private methods. [MEM] Allocating stack frame for EVM simulation… [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Mocking MSG.SENDER as 0x7c4a4b483686001d47642cdc5e0b0e038fe2f31a. [TRACE] Call sequence: 971e -> 966a -> 0b96. [VALID] Comparing result with Triada-Security-Standard. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xd83858aaca78a875b4e9c55fa99c0f07a1e38e64 0x8c663997e2c3ad6450fc9f5dc5cf9b7d0ec62973 0x3cf5b362fc6b665655c9a107764860f472ccf6e8 0xade9a7a3c0995d30614b08648f5d966e5da24afb 0x0cc1ae1980098b5e4b9e573d6e0d02812a4681b6 0x03571992cb525c00041de3c5c815258730acda06 0xfa5e3c48523ce1b6d854ca5aae592fbcf0519103 0xf822d1b4bcaa0a83cd582422a07f57856779b695 0xa7dea91bd30a4f724da257bb5329292d8fa43877 0x79af1db9b088bb71df2cd03edc6387d7b64d134c 0x4b5f9963ffbdb4bc91bdd336c6ca1f901875d05b 0x89a761b2766ae3bbd1e7e4ed80331305057b7176 0x163fca13cf43450cacdfcd38c9122071eeee8efa 0x8db60603e8a7c7ad0b4ebba67a522b7b077926ef 0xdf9c2e772b249ce72cf0c11f4b25a76bf8fbf62a 0x8dd1e5860f5c882cbe33db321c5f55f4658a2050 0xa58400d6c697d249897decc7821097030bd18e65 0xcc1c83b9157cd3acebfe9b39cd94ad0f755cc921 0xec33fa117269e12783c03b4cf948c2e8b71a9ed5 0xf70c83b31a4fd5b1d83bf8620e804e7371dcf93f