ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-70571CB27631
|
Infrastructure Scan
ADDRESS: 0x523c075a5b6037301f24de07ca58b4f04279446c
DEPLOYED: 2026-05-10 04:27:47
LAST_TX: 2026-05-10 05:27:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 5FBC5023. [NET] Pulling contract state from Alchemy RPC… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Mapping ownership-protected functions… [MEM] Allocating stack frame for EVM simulation… [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Fuzzing input data for 74 iterations. [TRACE] Program Counter (PC) synchronized at 7089. [VALID] No critical memory leaks during simulation. [DONE] Disconnecting from Ethereum node…
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x9c24b33e80105cdabf4072587fb6484d4c085070 0xd14d39dc1b5475ee170e604b213631ca5a65c6ad 0x1d74f13733bc75d935298c0e5073586b2e857396 0x55a8d608e3966f55d1f5d6fae6bae6e0d4d908bd 0xcac639d17193b6ebfe8dd23b07a0c0e7bcf167b8 0x877e0535f1e1bf4177d081bcda2369d70155bd06 0xcf47a30449ff158ee8655de5c4b586f0963a35e6 0x3d4dfb8e372b57383c6f7867121c5ad915889a01 0x2e17d94df01c002ff613ac4bcbe414fa9458d633 0x6e5e18ee47ab15c3d7508cd011cbd00f8b6e2a7a 0xb3bcbb4dc507586eb72321a5c451d0e61823dca2 0x930d5f6f8eb823451083dac699f163d15af56c58 0xe129ddf0c17d7c392e40714494cb8f41d6130861 0xe0b5ff097d82335072a865297a5898ca46c825ec 0x05a3f473adac1f1e8aea9022080eb532a1e82269 0x8dfa0c4fb2effb43197d003a6e21e9d681078f53 0xea338fe277675c2ab9ea7f3bbd7abfe6269f9c1b 0x3d42a4a5e7d50583d11c77a7afaabcbec107271b 0x39a767dfbcba5db2c6c4d08799b0cd346b07236f 0x3fc77a4b5652ee582a97c3091af521c141c5c775
