ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-0BB76B70D663
|
Infrastructure Scan
ADDRESS: 0xcdc13b074fd735a5273393b9ff73d12c4a1631cf
DEPLOYED: 2026-04-28 17:48:11
LAST_TX: 2026-05-05 14:25:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Bytecode size: 5994 bytes. [SCAN] Identifying function signatures (0x13e2dfd3). [MEM] Tracking pointer 0x888ab466 in memory heap. [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] Testing edge case: Zero-address transfer… [TRACE] Return data: 0xc1efcf46… [VALID] Finalizing audit report for 0xcdc13b074fd735a5273393b9ff73d12c4a1631cf. $line = str_replace(‘0x313d429b668b6e61509706661d825a20194bc47d’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x18899c236ba951c2327618b92074bd56fb58705d 0x66654022d7a0bcbe6b5da7ca18dd458354d15391 0x836ddd00f1c4e19feb1967ef291f0922284a6511 0x5f1730d69c2ca01b8b564a76fc29e3f9d551bb4b 0x0f6d340425eef8ae4764c87821acdeadd459ad4d 0x2c4c371eefe03c63aae0f12289254dd9f224f9da 0x1579ae4ec99a0e938ce55563bd89332ae21e1772 0xe10cde9c80749f5a28dce0a4c4362650f1027f79 0xbac9799f77c56ce1873b6a1cc545b69a0d20195d 0x6a2560f1e4bb5c4cb9baf63afde874d325cde419 0x4ec945405968c4a13a8df6ff192643372759be92 0xee7424f4f9494035098f12cd7373207bf67b4621 0xc59bead4f285dc3a1257b478576afa061606bc1b 0xd15c2e27f0fb942ed1491042689e8a757eeae848 0x012b3b44433bb62830ddfdcabc5301106a4dc019 0x34617c5bf72398b92fe4f0f63798e9d8836b9af0 0xc3c172a91e7c6d1891275a91cf4a3d4e96a80de3 0x3f24893e2961a2c6e0015d3866770dc79d838e8f 0x8c53a9411e7936b1cb9f5569d45e4e0f687fa22a 0x64c589f3ef894678e46af3b851aa08be3f40a674
