ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-B50BF8B5A511
|
Infrastructure Scan
ADDRESS: 0x3289b9db5d692eab3efc11c0353f7bf175e9c278
DEPLOYED: 2026-05-08 02:19:35
LAST_TX: 2026-05-08 02:59:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Pulling contract state from Alchemy RPC… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Tracking pointer 0xb7ed5f55 in memory heap. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Mocking MSG.SENDER as 0x9e4c0dbfb5c7b989e4a564818e8611dee6b67ffa. [TRACE] Call sequence: ad32 -> 480a -> b740. [VALID] Gas optimization score: 19/100. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x5e943b4001d8115fc1223e55e48dc34f6e2c3e19 0xb0318ed282e461f73589a3ac1f8ce2518e35cd19 0x22e4672c1969b3194d331b1ef6fdfc6ffe2f09e3 0xa433ed3c68141777caad6994801ca549ee0a748b 0xc19f7655fd08e3b6e85756cd5456fc02c3a7e96e 0x8acf40644334d8315b3cf9779627dbd572ac2889 0xbb0e7f7051db82d5a2ebd71e63a7dc73e75956d6 0xb807129602292523841ebfdbb7d2e947b0954886 0xc4a550fa3bb81fff2065e2b5a632e44ec7c2b45a 0x183401f9d91023401517ae7e68f3d6b8b707d9d8 0x034d6babbb067eee4a67357b687c9b1267aea1ce 0x1e5c8e755aa14901251469009510fd243b02e6c3 0x7d22b56541fd8ed4966b15005bc4c5b8d92c0720 0x45bb0cdeb04aefa7ef17c6fcdc1397fb50c38bc3 0x0a4fe189bfc6cda87c41e38bb76d74ddef0e35d0 0xe13cec33155d8e52862c644c91d94459b84a14bb 0x8105c42fb3b672587529f931d15e84a526969995 0xa16e10dc8d68c2d4fbffa6f34fbaa463f81d81ab 0xb1db5626858b6658dfa8147e6b005f557aa1e98e 0x7ebc474a7e30b33af06cfd7c83a90dca0bb45fd7
