ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-6CF1F02FC3AB
|
Infrastructure Scan
ADDRESS: 0xedd4dab3f0c55a0806ee538feb5f512c5158b9db
DEPLOYED: 2026-05-14 00:51:35
LAST_TX: 2026-05-14 01:30:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Synchronizing with block height 12991. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Analyzing visibility: 4 public, 8 private methods. [MEM] Virtual memory mapped: 0x0000 -> 0xfc02. [VULN] Warning: IS_DEBUG_MODE found in storage slot 29. [SIM] Testing edge case: Zero-address transfer… [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] No critical memory leaks during simulation. [DONE] Log signature: 77dbe395164d1ce3fbce2c8800f64102e8c7e28dd7b71f5578d3be52be9e2cbf.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x60075ba915171a7876d08f66fc6763e8e3db59a8 0x257e7c14230845155ec73d0c276a69e8d31dff9e 0x47c2a35be9f7cede35b874dfe0cf86f9999b452c 0x342302628229324155f40f026bab9570e043d93c 0x3b24b454650bae2fbd0bbe0d0ca4524f32c82aa4 0xf11d8ebbdd5d7c7ca31670fbbe1ccf90927d66f3 0x6e0fdecc906528e17f4437bda9a119dffe4ab5e7 0xfd6fa12eab174f7b082a438130c49b190eb4410e 0xcb3a33c6928557cb71c5119d1fbdfcbceec9d86f 0xb12e237e86a9daa00e7d60391776191762e181c2 0x1d3eb7760057306fdd2fdb9af4e5232ac3985698 0x4b2c01a529b87dc54a46eea3316965c4eea7638d 0xaa4966eb805130e4b322d30a66f234da8f16be71 0x1553f66b71313047b38ed17efb23a5cbd13777ba 0x1a9e561276a76bfa8d2f9356855760717856a310 0x6ec135fbb5083ec183774159757c4855cea668aa 0xc8194f0b252720979644495977a21aabebafa2bb 0x8177d64c7d52f4434e27eb76583f5d8f2044a43a 0xeca9f87f3a5acd7cfc2ec723c8183bb71adaccb8 0xdc7c7a8c0f6ce7d2a3b2807e58dfd14c2332f75d