ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-CA1A3035BF07
|
Infrastructure Scan
ADDRESS: 0xd904975d7fcee8e42542793054f212b9bbcff49c
DEPLOYED: 2026-04-30 00:27:59
LAST_TX: 2026-04-30 01:36:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 3645510B. [NET] Pulling contract state from Alchemy RPC… [FETCH] Bytecode size: 8760 bytes. [SCAN] Running static analysis on JUMP instructions… [MEM] Stack depth: 7 / 1024. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] State change detected in slot 0x49. [TRACE] Call sequence: a914 -> 95bf -> e18d. [VALID] No critical memory leaks during simulation. $line = str_replace(‘0d88cb544dfde45b15735003c2607fe4919d4489883a5e35918d0db991fc1031’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xa3a99c84674345915d8aa9b221aee8635ee0cd5c 0xda870d2763ae0ed0c9bd4112f5022e8dab3f0a06 0xaf01a851379d311dec666ecee0aa37676e112405 0xddc6d0037c96d3a252e7c9daf9c5b6826f74b322 0xd853b7de774342e457a533c09a62f6e13e840325 0xa932c16fea13060cf1e4aaf599aa04126204ff60 0x3263304d074afd79b18b4c94a2edc1193178e692 0x2b17de3a8f26f6a80b3b82617a81da92aea2c6ef 0x9628559741fe25ac21fa903217e3dc83d9de5eab 0xa21e2618af310667fbaad36449db72aa3a667bb4 0xf0b5b901284887d9f07de69b5ea8b625f1c436bd 0x13e6f410f82dd9b793643341f72ff127a1544d75 0x8711033a57a3035bed2fb6a243e1f1f7f9f8f31f 0xbeee790fab0d571731b3a4052c2ae220c69e15dd 0x8c21bad7679718bfb91aa8636a94436b77b66a91 0x14bcc01fe0c3ee8e5234f418b531d723d9460d74 0xac6ac76b2087de574bfdc9d8e320082f403effc6 0x22c0033d4862a0f8f65e2174a281adbef58890a8 0x0d1657135ab781b55e606d28f3162f41bef0ecf4 0x41963fd6c60a0369d0ee2219418fd2d482c9c902
