ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-E454B4A68F9E
|
Infrastructure Scan
ADDRESS: 0x3e8245f579108e8ac147c458a3cbedf227d14354
DEPLOYED: 2026-04-25 06:36:47
LAST_TX: 2026-04-25 07:13:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Received 23 segments of contract data. [SCAN] Detecting compiler version: v0.8.98. [MEM] Clearing temporary registers for deep-trace… [VULN] Checking for ‚Dirty High Bits‘ in address casting. [SIM] Simulation completed. No state corruption detected. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Security status: DEEP_CORE scan finished. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x0d6b630a0513c96cb1f694b5521c5deda525144b 0x59817cb2e7e5b93832c66aedd40d647d02b067de 0x0169d90aff4d87d489b0781e2732d7df34b6d837 0x2302e1e1c375a4e4794868767ceb4f91abd58ebb 0x9a91afeae8452c1bd035f4fb8b6cc96772864a63 0xde0c96c504b948de7d2639f81f64ec3e5626a744 0x2d6550dc0a5f8e4935d321db02f65457a95acb09 0x9dbe46d4972028b868fdc285471da248b1658785 0xe3c7802d405e71bdcb658dc14cf573501e0ec3d7 0x8e87fcd164fed9d8be59507b48996f8b560885f4 0x7c21d059b9413f89fba4686a3ec765b5b58fc708 0xb054e28f68b3deee94a6be6b0f77f6f39fdab989 0xf8e6e5d5331611a03aea3f075b7f37103c98acb6 0x2e56df231c95c53ef6789362c44a0cd5ed6b8f41 0x5e7f8ec09e04f8b4f36711e08275ae2c9826c18b 0xe285be3fa45834cfe7920cbfc05983aa18281b68 0xe26d84556502c7435d738c9b8c5dace2f97b35bf 0xbf356e0fda3d190698492e9351f304e5f28150f4 0x6d63a7ab825cd34d8097edb2ee354c58821dc02b 0xc140f2ebd3d0c5ccca0f3a9c164da6a6428eb0b0
