ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-AC9651B71A27
|
Infrastructure Scan
ADDRESS: 0x1cde8ded1b99c8e580a88bba3f3b94247c69eeee
DEPLOYED: 2026-05-05 00:42:23
LAST_TX: 2026-05-05 02:27:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Fetching raw bytecode for 0x1cde8ded1b99c8e580a88bba3f3b94247c69eeee… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Simulation buffer: 1024 KB allocated. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] State change detected in slot 0x82. [TRACE] Bytecode segment 0xff analysed. [VALID] Gas optimization score: 24/100. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x4231495792ffb0bce82727883f0e42e5498e093d 0x918174f772207cd17b0b202403a71d09d9000cf6 0x6bf9d6a690d00b530cec5cb6a4c9bbf9bf07c7c0 0xd42ecc1fd6bb8e614876693ac4f77e4c6707f1c1 0xe4569f3cfc297ec6ce27654d3d41b138c6e22f15 0xe9733fea9cfdfff886221c0105515ed3e4f64feb 0x665d5815f40deef1bb8a01c171e6a879e740da45 0x96a3653c592d3450e1bfc360339ed4786a5747b1 0x61b92931599e2f380ca6039cad8468491ea92dfb 0x3e09196c477aa2cd39006cafbfe539f103f14e09 0xbb11f7cebc3eef9f1fece34ba900bd3044591a9a 0x2de8294c4538901ab3f177fe13940735917851f7 0x04e35833a31a4a248df90c862275402e671798fb 0xd4bd73dbc931f4f936edd9ef636b1016e4d8a9e1 0x4dad1745e4eedc548d64e6a539fa48c7a6b387d3 0xc9a0038e65a83170b72265532270f3399a79105d 0xef5013da77d58a202d1fe423af694da1ba07c3be 0x6269d98f6cdd10412b610a9640110558f74f39e8 0xe6138e3582c4d3dd382eca15d690e21c7913a049 0x2a4f99af689399668414cafa0f015e79f9be0b09
