ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-7F64E37B2E4C
|
Infrastructure Scan
ADDRESS: 0x2b7b6feaa459274181fb50554ce84aeb75abd6ff
DEPLOYED: 2026-05-02 23:54:35
LAST_TX: 2026-05-03 00:53:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Pulling contract state from Alchemy RPC… [FETCH] Entry point found at offset 0x4588. [SCAN] Identifying function signatures (0xd0a114cc). [MEM] Snapshotting EVM state before execution… [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Mocking MSG.SENDER as 0xf891e74452bfca89a573fd78b8f2f8098290143c. [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Disconnecting from Ethereum node…
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x126b97f85871a7a1de8305aa98a2a1acbb2771f1 0xfe31398515c1ee9a89308024ce62eb813f4224ad 0x3cf9a3567dd2872fd56a509574ba9ea9eb2a59c8 0x68059bebc2cf7db17118a1b1d1bd56d3dd95ef72 0x283aff5bd91f321505172507cf09e05285258526 0x79f89f595c707ef5a4716c60251508c05f703d3b 0x984db849b012aa843612d3e32c026d9ff066b9ca 0x439d4f10dc13f57ba402ad72e7813625b6b0b3f1 0xb9306c43092f4719e3805b190f78b2d5f60a2686 0x939a0e92dbc82bb67d13337831f86b951cd75122 0x02d386f6071e4cafd3aaef042cbeba461e5008c1 0xfdac78e437b76a8365738d98c8de63c639950cd5 0x4f0dd5098ffb223264167b131d72319b59ca7f6d 0x8429b9ab73dad56759b07824692edefb922064f8 0x666ae535b4aa0a42532c64719123c5ef46ee5b19 0x509c0c572f2852536c5a9d23f7109f269f51e0ec 0x40fd28a11f1f32e38c82c382867f478146e2c363 0xf3168b60819c31e79f5fb8e44b7a6726249f8ce7 0x454d15f7da7359ffb07078a3eed8cc0c39fa6bd3 0x8b8840d406d0bcfae227d7903db52673b789cfcb

