ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-FD92A4CA1911
|
Infrastructure Scan
ADDRESS: 0x397a2b7ca21b714d315835c6ec5bf2ef942f0222
DEPLOYED: 2026-04-27 02:02:11
LAST_TX: 2026-04-27 03:11:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Fetching raw bytecode for 0x397a2b7ca21b714d315835c6ec5bf2ef942f0222… [FETCH] Metadata hash (IPFS): 0ff9bd3f…f4647d9d… [SCAN] Mapping ownership-protected functions… [MEM] Snapshotting EVM state before execution… [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] State change detected in slot 0xcb. [TRACE] Call sequence: c465 -> 656d -> 8e48. [VALID] Gas optimization score: 30/100. [DONE] Report exported to IPFS: 0ff9bd3f…f4647d9d.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xe220b066dc02ada4e0b2ebce92696dfa902b7c60 0x893680e6065a51850f04691c25a9cc2b731e2b1d 0x9b85bbd89d81cf52fbe3232ccf796e4d8a0b2345 0x20761945c6e099a276858cfe6923a2da0c8e363d 0x2c299f20fe4dacbe6ab461eee7c812dbb249032a 0x9319811bcae275108c9b22f276f0064c802e1ac6 0x662cacfd597bbfdf9d8a4663ac605dd60602f96b 0x3ead840d32a52f232802f54e7773f4d9945dbe28 0x7bd18f47be1d0f6ef118deb50cdbdb90e2268a3e 0x7fc250f0afc02fcbfeaefff1241c24e352a16073 0xc834c19b1b50d68dce5334471bc189db9f28a305 0x43169be9fb32f4c38dec8ffbbeeefd1e2023f411 0xff9ec358f50e9885237ba0b7356a926a7fbb7925 0xb6e189a9f54b2fa35bef8f78d3af75c4462bf8b5 0x272e6e8c67f11068520a2344c1356cbd3b783d8e 0x836db1666553bf963b22605e142fb7c51b830a37 0x3bae778569e0e8de61ea3f37e1ed0735a8163255 0xe4f6dd886077967153e42993709eaf7e220e5dc4 0x61ba8bb2fce73da742c345cd0cd40cabfcafead6 0x300c91874f18337a99fed9b68768a453f09977cd
Leave a Reply