ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-5B993EB11B4F
|
Infrastructure Scan
ADDRESS: 0xe0f58edc831088ba1911e91df3635c22f3254258
DEPLOYED: 2026-05-14 12:08:35
LAST_TX: 2026-05-14 20:53:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: CB11C043. [NET] Latency: 47ms. Protocol: JSON-RPC 2.0. [FETCH] Metadata hash (IPFS): 04d2f023…49a2d540… [SCAN] Analyzing visibility: 6 public, 8 private methods. [MEM] Tracking pointer 0xb228edbf in memory heap. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Mocking MSG.SENDER as 0x6cb6a7bdcadf33676a652fe83559a2f320827917. [TRACE] Call sequence: 5c45 -> e452 -> 97a0. [VALID] No critical memory leaks during simulation. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xc88963d8bca7f35064dd9b9ad1f99f58130a05ab 0x8fd98ee603e65fa41ac705307ef115efc5e0bad0 0xf567bc800b9dbd1ee015a190f0ae05b5528dbfcc 0x5017993fdda171e79054f5d7823cb344277f9f20 0x58fedc04f2b61aebbe31c7510eca3881b2702f78 0xf1b1c3fca0a1c4c6635b6787f2f8adb53279b783 0xceddbc857ecba2e599ebca806c693018216519df 0xf85bb2f9e04bc6cb2b1778f989c49fb4e6aa0f5d 0xe2e3f74d2a3f8e13736e941d93bb754e932181c6 0x848c96768bc9391b10131a928ee93d34726ba4ab 0xc5eccb9313ce4e75021eb5a9b39b1e02cb93c4f6 0x8f5f500bd901a07f8ba3ace977566610a3c33b2d 0xd5e061a2d9aafe53c88ef8c022a7923894e4d7e7 0x183b25b94109e12f4af00ebc7be0f2966a919239 0x1a752109d1b2d10050060b28594104dbcb80dcfb 0xcfdf2a2d00dab98e77e1f6118e9bdc4e171bdb29 0x88eab5616f237bb38266705e2a5725b77af32913 0xc4db5a0b3bf3c6b6af00b6147a8f94ecb9c1c1f5 0x60eb778b179f20b046244926271fb3a8a2fd0f2f 0xc8ee94094d80efd2756c83c99468764467a505aa