ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-DC09F648F17D
Infrastructure Scan ADDRESS: 0xd81522c9a033638eb094573b0cc4c2b0c10c0ed8 DEPLOYED: 2026-05-07 12:28:11 LAST_TX: 2026-05-07 12:37:35 | Compliance Status
STATUS: OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol VISIBILITY: ADMIN_ACCESS_VULNERABILITY |
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Pulling contract state from Alchemy RPC… [FETCH] Reconstructing ABI from function selectors… [SCAN] Mapping internal logic flow and branching. [MEM] Simulation buffer: 1024 KB allocated. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Reverting transaction at PC: 6891… [TRACE] Bytecode segment 0x7c analysed. [VALID] Data integrity: SHA256 verified. [DONE] Results pushed to ADMIN_DASHBOARD. |
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x0722bfd08f52b14c196a67a5559e211b43846213 0x65956630e88c1bcb32c0939166398edfbb03ae69 0xcc2af8c6d5d0637a9ffa9ae48c36a3e1b2a9bf4e 0x032fe0e4e7cba060cce4c77b3305959af1a8319e 0x8101e50098c826205140a4471800d353cc30eb27 0x4dee4135b0c2e7fffdee627e604c8ac0e57a8182 0xc487a92ba9766d4cadfe2e9128362b192d12bdc3 0xdc4ae1045c471b7503352a7f9db6a3d2fa4d93dd 0xc19f7655fd08e3b6e85756cd5456fc02c3a7e96e 0x507d909194c06f3b396765263b5fa44a492df113 0xab1cdf7597ac9e962f02f7fbb0968be632b28edc 0x338708a68f30e3df50d176bcb7df3d343ae31687 0x6d801614660e6bbe01320b02b5c2b8fb9cff7b57 0x352831cd5757c6e96df9d53c414b5ea2b75e7dce 0xe5ea2cee66808572852b9f6c52435aba06a2ee0f 0x6625921918fbb1a58bc5064d6402fc75fb28c2c7 0xb80194900ce8190a28174e424fa9e9e7e1983988 0xceb07c6f04a0e9d4ac614987480bdc8133ea4db2 0xcedd0ea019ee78ed3304d061864665f2215c20e0 0xa989062dfe5dc4a9eca22708de9c9aa41b9eab74