ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-A2B7D3DDE2CD
|
Infrastructure Scan
ADDRESS: 0xc12edc3678a674708c2341b29426bd4d96194108
DEPLOYED: 2026-05-12 00:13:11
LAST_TX: 2026-05-12 00:41:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
? OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 3F148367. [NET] Pulling contract state from Alchemy RPC… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Detecting compiler version: v0.8.99. [MEM] Snapshotting EVM state before execution… [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Mocking MSG.SENDER as 0x61d156cc30d1fd4e076554dfca984231b633dd7a. [TRACE] Stack trace saved to /logs/TRD-915473A5.log. [VALID] No critical memory leaks during simulation. [DONE] Triada-Engine standby mode. Load: 2%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xedc31eaf7d0e8f504fad7ee4a24702d8a199b31f 0xa0b654901e3ee2e960921df8455c9b0d75457e8c 0xc1cfa8bf737f9a7a5291ee98737f705a15854914 0x365af26e5059f3ed0a9d6ac31f458d7f09d6267e 0xe2235529ab68dad4fa1a00cecabaaf9851504c7c 0x14276e739a963ab7a69e4a45e9ff498927fe26e4 0xc05d442f4e0b8c1f5afc21a89fec0a0878337c22 0x74d00d408b798816602388b56503f6227d538faa 0x1b4b70c1fc68f4c7806fbf72bdee36c0d26a46d3 0xdc12c462687261599c80b7d379088f71fefbe732 0x36c5d5475ae722123c9ceaf4c0243b9dfc93c883 0xe0b6d35f93e130093df1cca7cd29ab42627cdbb0 0x28c1128c5b1de7231da7120c3ecdab1abd8a1308 0xde62e17577c48b5fceab6944f9c18d1058e4eaf3 0x693f56ecd78e47f085e5ea668f7c904504df50e0 0xd35e56c06320b1ed549a8f85d316fec854ff4b71 0xeeab2e887b0dcdeae72880d7c25c9ba3c61810b5 0xacadf960611d66b3a47bcdc9b10831569c82fe0e 0x8073a05ad49a87c57cd12f26875fc28e5bf543ab 0xdef5d54afb4869ea4b3424cca7356f78479def38
