ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-44CFC2A3FC3C
|
Infrastructure Scan
ADDRESS: 0xc15be8e471f7ef1bb96705ded41ef4cecf0bec92
DEPLOYED: 2026-05-12 22:55:47
LAST_TX: 2026-05-13 00:29:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Received 43 segments of contract data. [SCAN] Running static analysis on JUMP instructions… [MEM] Snapshotting EVM state before execution… [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] State change detected in slot 0x61. [TRACE] Return data: 0x58606806… [VALID] No critical memory leaks during simulation. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x8520153330bf3531ce283388ca6121bc32b19dec 0x4232e63ca15dccd7dec513fb54eb7463b5d174ba 0xc046c8af1170f466fd295ced0d7044dca5a617ed 0xa65f653692bcc1ec8b67f3ac91cc78d3d9fceaad 0x97c52a56613eeb843189b95813de254a9d395119 0xbf3c42931cb8ebf4f24effd057623ae9f2c4f43d 0x42d1a3ba0f27ea880cd5be5c470bc8e767d474a9 0xaaa28ce4b8bbbc9d11d801b8a79157ed75145871 0x8acf40644334d8315b3cf9779627dbd572ac2889 0x0e94faa1f5e9e66bffd89d8c86da037931db272e 0xbf6c45dbe5775fca4dc92382b53eeda1162e2eba 0xaf5869f80ca9fb556390c6d565f25e7d2da6e908 0x6af59b4e2f38705e1e30bbcb30fc3597fab6cb17 0x51d7cb8f1ac2b547c1cd83af23335cf2750ca4d3 0x889b907e114339a2aba542db88b3a519443f6b68 0xaf3fb93450c7ca52333bb203d64a79d342cdb54b 0x01874af1507fa27129716c3bd82c28f7531cdcdf 0x9752a1c27e2a2725d66c8146694c9499e028ecad 0x65d719e76d230faa310ef1aa64ad3c659cc3bc89 0x3d64c2fd6f77f951cabe38c5390ebe0c914e6cdb