ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-6A01FB553CAF
|
Infrastructure Scan
ADDRESS: 0x02075ca0c485ea398d2321763c677adf5a2cca2f
DEPLOYED: 2026-05-08 07:37:23
LAST_TX: 2026-05-08 15:56:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 17E1854E. [NET] Fetching raw bytecode for 0x02075ca0c485ea398d2321763c677adf5a2cca2f… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Identifying function signatures (0xda882de1). [MEM] Virtual memory mapped: 0x0000 -> 0xeeb3. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Testing edge case: Zero-address transfer… [TRACE] Debug: 1a4c55f233073382. [VALID] Finalizing audit report for 0x02075ca0c485ea398d2321763c677adf5a2cca2f. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x8e92f5b951c5fd54a8217bf91daab6aff2d5b1af 0x236bc8e51cb7917f1f1e67669e2b6ffbb2fdada7 0x02b36dfc858b32e8ecb7dea4a588b5881fbc22a4 0x63f96249ad35fe787213011a8ea1233ea6b7f56a 0x12ec0e0055fd87f78383c354d4dfe9424bfea8a9 0x35aa7a8cbfccabd99040e6fcfa5566765b5166ea 0x2afd863e1da50d63348a7809783c75a262f81301 0x633748335ee5b33dea9fc25c9ecc6f92270c713f 0xede343a389511e59af8db0c330d1938ca86c1391 0xa715e10eed1f7a47696f16688b17a0a390bf19f1 0x12820a287cf8caf976aa40783de3ed75a1a18b5c 0xd005bf776a48671d8d0479245ddf11649bc42158 0x3a1abe6440ec7b677e9994ea9078fdc9b28dd22f 0x26bd0b6cc905e4ee028f698c54562521bb903662 0xdce9b5dee99a8a4b9eb52c6109946e46d064a57e 0x57161997d2b343e5059791c633cddc65a9bcd928 0xb7647729833e946577d854d7b9064108bb428826 0x2876a36b5993918203e45f41cdd7ec8daa883241 0xa5fb7e0959293761c4208bcf0c251a591762441c 0x4bc3fe177ce57846b46a7e60676da2e362d8da78