ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-A13C76A8C364
|
Infrastructure Scan
ADDRESS: 0xa2d9d8238fd78feff1570fbc222cc1d6018b67b2
DEPLOYED: 2026-05-01 16:51:47
LAST_TX: 2026-05-01 17:33:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Pulling contract state from Alchemy RPC… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Mapping ownership-protected functions… [MEM] Virtual memory mapped: 0x0000 -> 0xec86. [VULN] Potential ‘Dos with Gas Limit’ in loops found. [SIM] Fuzzing input data for 45 iterations. [TRACE] Bytecode segment 0xdf analysed. [VALID] Security status: DEEP_CORE scan finished. $line = str_replace(’74b5d07d4a2161ce634293ba9cadbcb464b820213d5d1374d4402e50872c2219′, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xc054475d487617873a38e9089bf34025a1cba47a 0x47a3e569fd30fa9ce08554a79dc678acadb4bdd4 0xac19cb0abbb632620b2a8ee7f3281d8b43428869 0x656d68871e18e23e2b7d64ae7ec668340216c1b6 0xa99191fee90a74c38cf410f801a3c64a1e09c2bf 0x97504dd9540ab94177d926c45d726855df38e56b 0x55bda6ca31d495777d2c1b3114701bc1ad893e6a 0xa02a51e4069b46e1c6f6fb860e145c4d1138e792 0x5f843b3f5138c1d9d88ced91bd9356917fa24b15 0xfe31398515c1ee9a89308024ce62eb813f4224ad 0x599aa44af86ab9c37d609e0f117d793ed0f2e271 0x8d7b1af919ebb875c387ce5ab27cdf877aa5267b 0x8f573eaf6000e2fdf7f0c0e190e373158b7219ec 0xf8f0562632bb1858df0b34d61582291a55dadb6d 0x43c1f5d328e3f69ea893411b1626dbae917f5764 0xbfbd8fb47a71c2e295de452e9346f90252dae2e5 0x6495abfff0180a0060a2d80796b1e6e74329fcea 0xa27e83c78b800af0e79ed7f09ac61eaff450fd6b 0x8240a468a7eb4b7f85fadf7fa022afc86c059343 0xd6e418f4305111b6bcf01a9ea6439b78bea4033a