ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-15DD7BE011FD
|
Infrastructure Scan
ADDRESS: 0x33dd02dbf4441551d81149a0523cc509eb032397
DEPLOYED: 2026-05-08 12:44:11
LAST_TX: 2026-05-09 16:18:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Allocating stack frame for EVM simulation… [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Mocking MSG.SENDER as 0x75f2613810f18aba763d34a4490fd403635e4b3a. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Data integrity: SHA256 verified. [DONE] Log signature: a99a06e89c5ec46310c9d027814d37c4899f693e79553d7ebd6faf119c2ed6ad.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xa1542110ac1c51d9e0bc15c900d992415fac6730 0x3c7cd5ae4a5c59221f21f47e9d88228234fb7924 0xa80f508cbade969eb71ad96e54bd6922e8cbc57e 0x26eb6be9d2ac48c9e4ef67ef4218cb933c550976 0xe089fff8765781dd5f833f15c43231bc1a46344e 0x687b2599ad5062399ef8fa1e82bbeaf016ca700d 0x1fced2631aed83999f2b1dd33353fc989b26a8e0 0x9c692eb4f022b4a3ba3798a2e29d6aa80f4814a4 0xf07c5506b2a8365cb6a48be5dbfc97b2ee7b4ab5 0xe73d70f7cf158a0f886acb961e2591a832782498 0x9b00e1dbbef48a816ebd2310b0830caf17171bae 0xb1c5030b61f6f5fe50fed79aa3923bfea9a91d2c 0xf4a1c3a0f386867938443436e07c60f8c35ceb71 0x10bdf47479a0b9aefb4b2e8660be8f9281b14310 0xd9fae125a1e5dd56a594fd2ef9b3e880d681df10 0x3ce4440fbd6677c958d8748c58707df335330d1a 0xd56da8fc68d513777e34834182804705c3330481 0xbe80844f0a2708b564a2708311165bb2a54cfa61 0x59d422022e6eeb11e504e159bd3be9157528f4b2 0x0039be223d41da1d6ada9f435e13718649b90794
