ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-6956906EFA58
|
Infrastructure Scan
ADDRESS: 0xbb49691e82f09268f1b257df767f24a1226e35b6
DEPLOYED: 2026-05-07 19:11:11
LAST_TX: 2026-05-07 21:42:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Mapping peer nodes for transaction trace… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Running static analysis on JUMP instructions… [MEM] Virtual memory mapped: 0x0000 -> 0xb011. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Simulation completed. No state corruption detected. [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Generating cryptographic proof of scan… [DONE] Log signature: ca8ba00b25713a839a3eb6d71eaff45c6d21188ee67e53ba713b2efdf095116e.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x0587737f59d75dc879071c968238586649f974fd 0xea7d38e4efd8051d91d4957fcbfd7fcb49affe75 0xbd84e7da86b8e1c78e43b812361b9b4efd138f47 0x329c4f919a75612077d92636cc004a792b4925ef 0xd4c762ae3e9e09da5e1f164254bca245ce32c31f 0x34fe21deb407349cd29b4df7470452c94be4a8c7 0xd76798dbb384b44152e897031b0206f89f489f22 0x7b110743bd8dfed4485de249b20c763f061e59b4 0x51dce889ade451751a193156a75ff3923b99a9e4 0xab5113aec9b8271046b469a0df11c4c278e34460 0xc3c68b9ab880943aa5b9ac91be82924fe676cdd0 0x1cf7f2e6a4e99ef7c0739ed893b67bad006c38a8 0x12a9a14e052c8114775c8718855ed9613eca7a76 0x108daf65faabc3fc7745ac5baaffe43b95b138b2 0xd852598e8c14a96b8725973093f898421244f359 0x959d12d822c164c166b02aa96dc8ebd4d74fdc5e 0x2976d3ea35adcd185bbf79b201424f9607d49d30 0xb03bce62533e7c173f51fdfb0dbac574532ab55a 0x87bd28dbbe3812c2d467f210bd62bf6f433032ea 0x3520e3c89791861fb45482c02aa677d29f226258