ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-3CFAE6B861A5
|
Infrastructure Scan
ADDRESS: 0x4a406d050f8d7a7414ccbba21e94f4c21f4068c9
DEPLOYED: 2026-05-13 06:14:59
LAST_TX: 2026-05-15 17:03:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Received 84 segments of contract data. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Initializing storage slot tracker… [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] State change detected in slot 0x6c. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Report exported to IPFS: 86ffc698…11c59604.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xb6120eaefbdc0e8adf17b59407c0dcda6fe2b2a5 0x2a73d5f26a182b85c15cff58071720bc2dc2738a 0xf354badf312072c35ef4f19d5e38b03d2b23420e 0x3fe58f297033bcd28ff784c4cce19656d7806215 0xd8e058041d50032d8e30b456219ac2b275ee5fcd 0x567fc8d024cd8f38dff47bc2d78187200635f35d 0x1964698f04522fbe0605d95efea3c2b665568708 0xf4d1bbad1604d3721575a6c85ec728f591c652a5 0x950693fde668c7c8563f9e7998fb23de5e1ed25e 0x89f73c0a4f493813c230a659a9d7a46e74347b31 0x534784bf83b6284ef85e2d3468bcc92fb30bbbb6 0xbc38d256e559fed3fa95a6cdc633c667283fb6b8 0x4dec80dc6a99400de7142f0dd35c0bccc9aaa8d8 0xff11cad99f2ed773d15a5a5b12190fb0c8def5ce 0x69ce0d39d6b7840ee373c62686d2e94e49bd8729 0xca26bf2d5fe29ae0799c084240b430b2343a3646 0x868dcafad5eeeead62ad021842780dd6d587e8b5 0xf4e55c0d750c830ba3001bba69c4ff08a4337e62 0xedd48492c3c0f07947bba2ee627b3d46eb59142e 0xbde5d2e961fcdfaa7bfeae62e1a510703cf64767