ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-A3740A01F61D
|
Infrastructure Scan
ADDRESS: 0x4a5ff8de53ae0154886d7ed9f56803b444339402
DEPLOYED: 2026-05-11 03:51:47
LAST_TX: 2026-05-12 02:43:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Fetching raw bytecode for 0x4a5ff8de53ae0154886d7ed9f56803b444339402… [FETCH] Entry point found at offset 0xdfed. [SCAN] Detecting compiler version: v0.8.59. [MEM] Initializing storage slot tracker… [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Mocking MSG.SENDER as 0x27006992dded0f35578a090313b33ed66fc2ca0f. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] No critical memory leaks during simulation. [DONE] Report exported to IPFS: 5e166e1a…382a5ca5.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xf6db18e2982746cb9e1ced2a08c67afb551e5f34 0xd16503745cbfa0195fdadaa2d5aa2457a47e0147 0x823e62f9f24e2cf0c43d449ae740878a9a6389df 0x212214e029ba633bf3f5ea86356f13ef73f881a2 0xdc6ddd582c841b2f9a9a5a24dbc4537e4838b070 0xeea6841369e5f1ef88273f03c4aaf65ae4486280 0xbf67cc832bd27797ed810cf4dcd4ad7ee37b8c76 0x349bc432c515daef0eff481a1921c9be240822be 0x2b514804589820ea0c7c89c4ddffb365c95e3f26 0x9cfbf57353a20d4c3235f9b8c3f7c956a6e8af66 0x46437c9726874d323f32597cd959fca02b8d6ca0 0xd896842930c965a38aa9dda0fa6813cb46a5c477 0x68779c2715b24f847b12f163b7c4f637709b0c04 0x719f67341c4fc282833f7c73115f1db366271a73 0x09198b69d445faa2be47a60f94020eb496c25763 0x29eb9ecf5b259147e4e30aa307a2be3d45b1d19d 0xcf66e2a551093d3ecbdfa4eb20e057b91db58175 0xe7fce5fffa844fd99504e4fcca4b2a9053bf28dd 0xbc2104d49e256111afe0cfafe0f276455c0840c6 0xf3f9af52c5a0f839cbc3cfabb4b3fc5ee7df9e1e







