ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-54B5AA985EEF
|
Infrastructure Scan
ADDRESS: 0x1f4956d78af09b3eed19b760237fbee0119aaac7
DEPLOYED: 2026-05-02 00:16:47
LAST_TX: 2026-05-02 02:41:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Handshake with node 0xcd1b4a07 successful. [FETCH] Metadata hash (IPFS): ebd7adc7…2b840873… [SCAN] Detecting compiler version: v0.8.79. [MEM] Snapshotting EVM state before execution… [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Fuzzing input data for 27 iterations. [TRACE] Bytecode segment 0x28 analysed. [VALID] Finalizing audit report for 0x1f4956d78af09b3eed19b760237fbee0119aaac7. [DONE] Report exported to IPFS: ebd7adc7…2b840873.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x9467bfca020fe56e5aec8f297c515c7e342cf9fc 0xfe117375d59efe8646e6a0adc955c1c4c66bcf7f 0xc2fbfcd4b998b236f41ade8ddbacf0f79d2c4fba 0x1ad838e0b51d1b07b399893a6e8a5388edff0c9f 0xf5c13313d7e4ef7fb6e0ab8bb255ec9b1f81c2dc 0xc7ffa234bdbccbafcfb472f412f4ae296f25ef3a 0x09540c3cf3b6cbcba63abbbe808df2b6d0ac4786 0xe6bc1625fb59fcbc62e8249dad40ac59839d0f12 0x7b993d25495a48a5b18b78a02b646ffad51b810e 0xdc56414fe9ca7e2c730630902f953978ce54d031 0xa45901dd960734ebded1da35e251e21bfdee103b 0xe41a21d1285cc87178833b040fc964ea5ec6ccaa 0x690bae270a3dbd864a349a43547d5d8ee1d8ea82 0xcf3a5d8786317bad542af5ce4a73ff67076b36b2 0x5c14e15904529247b82729bf83302b1559a40cb7 0x1d895585c5d4f560e29ab7f9bcf6a85f3b796688 0xacce624713684bfce59e041d72175c406de895d6 0xa15b54cc654b2c974bf76e5fb17d995f6a7fb6ef 0x640fc443d7293dab7dd8e35de38688668f0b6670 0x83ac6e1607c611f64cf85cbf5dc3221942b850db