ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-0BBE12245EF0
|
Infrastructure Scan
ADDRESS: 0xb0897c26bdc3150831afefc7863f8b82d1cc87a6
DEPLOYED: 2026-05-13 20:48:59
LAST_TX: 2026-05-13 21:42:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Requesting storage slots for offset 0x00… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Virtual memory mapped: 0x0000 -> 0xd3d7. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] State change detected in slot 0xdc. [TRACE] Program Counter (PC) synchronized at 2683. [VALID] Generating cryptographic proof of scan… [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xccf35c5e56f854ced2fe61540647047f40820aa5 0xe080d18de69fa521a6d2a40b843cf83c012c4398 0xd9f7968ea01ec85062d34939592e426d63e3757c 0x063f4015c05dfacb86e7966d9e4e46c6f9be8924 0x011a753244731fb5b6630e2eda4eabdd09f8963e 0xceee1daff9e0ff0d174478d918b0fd6f45e6f8fc 0x613ba9ce389aae81382694dfffd25f3c17bf5cac 0x3018e98f989f6d7a4a90f730a79f09d5e1837661 0x0e979edf516f88119fa2843fa3f08a9643f8e575 0xd2a663ef51e2c3641a8eba2ab5295268b05d0e89 0x41437e6c1e71bef28dc964199a40281e9b3778c0 0x78c25b4570640642c3e352f19a1302134a21ffc1 0xdd05c56061d29626a6f5ae1cc088589ff4a8ce10 0x66652c36766f7f9b2e63fb471e67b39ccb14c0db 0x4469b220ce95cfad0404ed3eb92e38115d167167 0xf4dca308776e1752ab699b45605632ea691e64d0 0xb5ca7b86c2c74a76b4bafe0a9463c01a2a5af3f4 0xb154a2bb7cff1100ea76a7e58908b938cc6a697b 0xe27909ca3957bb276458af0a791662c8aa96e099 0xd3b0c051c978b47c6da519db68609ba6523e9dda


