ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-E74ADE602A82
|
Infrastructure Scan
ADDRESS: 0x9d4e43d733617340b3c3c13577f507fb8da49632
DEPLOYED: 2026-04-29 05:19:35
LAST_TX: 2026-05-02 23:24:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Pulling contract state from Alchemy RPC… [FETCH] Bytecode size: 8021 bytes. [SCAN] Mapping ownership-protected functions… [MEM] Virtual memory mapped: 0x0000 -> 0xa8be. [VULN] Potential ‘Dos with Gas Limit’ in loops found. [SIM] Reverting transaction at PC: 9796… [TRACE] Bytecode segment 0x9e analysed. [VALID] No critical memory leaks during simulation. [DONE] Triada-Engine standby mode. Load: 3%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xc4ba2b1bd36bb291db79c099a8d328aa1036e807 0x21aa600f321a9cef816180b5aa060fcecf3f84f8 0x1a42935a551687040c42d097a0d0f3b7257457e1 0x979353a08cb20e9a04975a336790a710a85c9d24 0xbd83a35a8765158a49dea54cbb42de606635eac8 0x74245e7448fe50994f31d787772b1216c872d163 0x4e8185d58821d92d535c215f964caf194687b76c 0x263800086cc73cf3113f5077adcfdc6bef1c741a 0xae610c428c3fc730df79f7c6d1e24a4906442129 0x969626767b9ecbb2eb20727787c5b55eb08fe696 0x3a0b021e0b7321055e8f6bcc553b58192e150bea 0xaf1d12724c87de0bea3eca382d24abde094dc83d 0x7403345c981bfd1bb7c620a05f9e3844535a2ffd 0xd945244c64225fb450814e5098bd319b3111c769 0xe5f4728264f53fc4e41037e40c95c5098c5ee63f 0x2a1dca74e04b060424611a1eb4e89ea8be81bb2f 0xbe277e6439cbe5d58822677701a6b7ed20e19a37 0xb1f84f8a40e45c76c9f6a27431d0b070da491c2f 0xafde06f7e294a9edefb087576a106b860e9bc5f5 0xb0fc079917fd0334576e96c0742417786be8326e