ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-5D3DE7389306
|
Infrastructure Scan
ADDRESS: 0x315d3626365f1ddd4ccc7e0535be91bb26dc3c18
DEPLOYED: 2026-05-13 17:03:59
LAST_TX: 2026-05-15 01:43:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Fetching raw bytecode for 0x315d3626365f1ddd4ccc7e0535be91bb26dc3c18… [FETCH] Entry point found at offset 0x6cfd. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Virtual memory mapped: 0x0000 -> 0x10f2. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Balance check: 4.32 ETH. [TRACE] Program Counter (PC) synchronized at 9333. [VALID] Signature verification: 0x0a06da9bcb426821f5a916edc77e58e247bda1f7e7a99395f6126f7a9ece49c3. [DONE] Disconnecting from Ethereum node…
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xcae2da85cd83886a830da3388f142f6f14fb26c6 0x40ad965ab5f876112be0b996b1128ee1aad1f9b1 0x9cdc2d926f90c4dfd38c245f45c33c9477ce787e 0xf2c2102ac31a91e88a1608fbbee2bd359e82c2b0 0x224f1a667df8ec8f70be415ecf972546918f492e 0x79828705002ef4fd6294109da1af788d20c9d196 0x13150b2170549fd433f7f933ec9640e4648d81ea 0x709e5ea266b5a07f8de1ba9ffa71848efea4f088 0xdbe9e6fcdd71d5628c974d264a6070411a5939f7 0x16cfda746ab4dacbb40c9cf31ec4658d4a3e7191 0x232209474aee89b5801075185ff8dd0a3416f31f 0x7252e2884d732d4539924fb7af6ea4d30ce21e51 0x164ad078bb7f17f772ccdfb386555515b8df5a93 0x75a42715c6b8912631971c0737e523a662ec7064 0x36345bf7ce7ed1c36fc6b95706ee2e443d965b32 0xa183ca6e5ddcd2b0e9e3f5436c7d2129354c7ea3 0x86b6d5ef9303596b70e59695f1790bf73e77058d 0xa081688ed37416da64d5fda14ff72950bd4d557d 0xf3107ed95782eae4f1c8f7f69278122745523c11 0x00a7aa1a3cde1a1a04b75158934f9472c5c6a4d1
