ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-48958BA9D4C8
|
Infrastructure Scan
ADDRESS: 0xda70fb2ccaf9875a0196d67ba0989547bea1b4d4
DEPLOYED: 2026-04-24 03:28:11
LAST_TX: 2026-04-24 14:30:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Pulling contract state from Alchemy RPC… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Analyzing visibility: 3 public, 3 private methods. [MEM] Tracking pointer 0x44d345ab in memory heap. [VULN] Warning: IS_DEBUG_MODE found in storage slot 20. [SIM] Testing edge case: Zero-address transfer… [TRACE] Execution path: 20% coverage. [VALID] Finalizing audit report for 0xda70fb2ccaf9875a0196d67ba0989547bea1b4d4. [DONE] Disconnecting from Ethereum node…
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x071590363749895ef9578e039c76030482c6045d 0x3c11e390beb5f96b507b6cbefa8f6b85a28441ba 0x054ca4d18f05d6fde7340d457c893f51dd2526a6 0x81ea3bc9edbce530cbb8803223e11841e0fc934a 0x756d338f485d6da08e1cad9e8dd3ea356a7ad22a 0x67968cb356ff14273e974373111ff01ff91530ff 0x9f72d6de71d9022725d7061742b70ed6107d500d 0x0325dc4f2603574f858879b0489083654341b29b 0x5d7aeb00e6b4ebd559db027f297e2fc572728189 0xea885ec2f6d39824fd359b311eb7e101c2a5c843 0x900818d9e8bc13fb630ff9f41e06d8756fb8d994 0xd92bfa83d7546e036f6dc70893993140b9a69ad0 0x9e5f22b9fbf4a7e5601605c777a19b9d17439e67 0x8c6d1aed2943e5a5ab30dd688ebbdf21c5a9e627 0x6ff0cead7ab8e106acba0de77de8b37ad77ebe48 0x0598b344630ff742a15b6ab978305c9c805193f6 0x92fba8d4ec72ea0c5b4f5b6e574566d9f53f6788 0x73c66ea3ecaecffd363f8c9b514e4259a4518f91 0x06632ac8d45eb1476e53002cf0186e64f73e0041 0xfaa2e2fd59211533b27a1dd6e79fde564b04eeca
Leave a Reply