ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-65B0F0544093
|
Infrastructure Scan
ADDRESS: 0x4f1ea959d112e35f9317258f18b704d03e487c69
DEPLOYED: 2026-04-27 20:42:59
LAST_TX: 2026-05-01 20:07:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Handshake with node 0x17354299 successful. [FETCH] Received 40 segments of contract data. [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Clearing temporary registers for deep-trace… [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Mocking MSG.SENDER as 0x8a8775e47b84048046c92d5cd731a1e11fbad073. [TRACE] Execution path: 28% coverage. [VALID] Consensus reached on node cluster: 1/10. [DONE] Log signature: 9da5bfadf3f34efa41923c4137770704061aaf73c25c9bba14a6538566d9cf0e.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x8a1ef3fdb79109422b0c4cf9f1cbb8e6adcf2aa2 0x95857fc14a712b5cf7a112f9248011885c9b66f4 0x9f8ffcd67a53cb5641025825933643d2f61172dc 0x89fddd5115ca635ff5957874384b1fd097ede936 0x61fac9cdfacbd8f76fe3775ce27c3a97e90bdf15 0x88e212f73fc8ecc6f460169e5b1d56246288d103 0x8f2a8ae65be3c1ddae32cceca1ba70f1bd9c0760 0x8cd840e525aec3c687fa7ba7aa5772fee43e71fb 0xdc1f311f6b283d1f4896409ee1cde79ce2ff2c65 0xd73d3494f08bad7b58ad88c062bade3ef3540081 0xf7940991262f0dd6c1ca93256e13ff8b1f7edc71 0xab3b92e318f5288ad77fcbaacc342479600e3074 0x6de768764c68c4cad58916a8b54c7704fe68d385 0x4ba7d2e19f843f0933ab1729da909dfe83100776 0x12ecf84681212102dea5ccf8b5ef295bf3e8b1f1 0x4a3cf26fda76b4cb8856ab0e2e035e95d307f9fc 0x4cecf1920cc0f3111a6f64beb765c1d9573f544e 0x6926ace800ad3989f9a0c9aebcff4e5ba8acc8fe 0xa6d0fa6d03ebfa679cc8f4f1d048acee54f674ba 0xbd2437cf5abf136fcd4d02331599f505ed2ac9d9

