ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-E18B099F6FE1
|
Infrastructure Scan
ADDRESS: 0x0831c9c227f84c165d3147d9c5483cbbd0b832bd
DEPLOYED: 2026-05-08 07:14:59
LAST_TX: 2026-05-08 13:18:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Fetching raw bytecode for 0x0831c9c227f84c165d3147d9c5483cbbd0b832bd… [FETCH] Hex dump completed. Entropy: 2.24 bit/byte. [SCAN] Running static analysis on JUMP instructions… [MEM] Initializing storage slot tracker… [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] State change detected in slot 0xc1. [TRACE] Debug: fcf8312cd1ba5084. [VALID] Gas optimization score: 78/100. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xfc52af1083f950989fc06431b697663971dab8a1 0x6d1bc4b244ee7f4df1133666be88224ae6e8814b 0x8f826c62c8e98acfd5a4e6603136c5af65848991 0x26f413b61ba739868ad0825ddeba9eae96563ed5 0x1377a454388df1d41f17f0ee41d702084388de5f 0x71b5d10dce3eeb7d3fef2a763b0753e647ca84ad 0xb32fcbcfb65b9208c5030311fe5f88e2e2408294 0x6f064aebe838c423a86b213ba80bdf6ed11320b0 0xdb6f509071f6b17ce663ee67a38515766119d787 0xad562c24a56b2d73378c98d17306234216fd3c13 0xaaa28ce4b8bbbc9d11d801b8a79157ed75145871 0xc2e661d70681037ba6ca9289a5ef7060d7984ec9 0x53fdca91fd33b9131b5ceade42a3edbd9b38edff 0x012710147efbc025d5af9ecf22117a95222a4801 0x4047e72ec2ebba3c94a66a1d0a0558c022ab5212 0xf9b52e58f6249940faf9d20c9d3aa37a197df717 0x6500f597644017bb20e8e59c2de7b78649a8bfa9 0xbcebcab06e28ac86116cf08f10858e7c8ea748d9 0xd76798dbb384b44152e897031b0206f89f489f22 0x26bd0b6cc905e4ee028f698c54562521bb903662
