ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-EE99AC38C4C2
|
Infrastructure Scan
ADDRESS: 0x31ef8489aad3f94bb08d5659d55137c0ab1614d4
DEPLOYED: 2026-05-09 11:56:47
LAST_TX: 2026-05-09 21:24:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Handshake with node 0xe7e73af4 successful. [FETCH] Successfully retrieved runtime code from blockchain. [SCAN] Running static analysis on JUMP instructions… [MEM] Tracking pointer 0xe676d608 in memory heap. [VULN] Warning: IS_DEBUG_MODE found in storage slot 35. [SIM] Fuzzing input data for 72 iterations. [TRACE] Execution path: 85% coverage. [VALID] Finalizing audit report for 0x31ef8489aad3f94bb08d5659d55137c0ab1614d4. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x5029d5100d8e7cf84cb70bc47a772c7c4c5398ae 0xee6c3d4f2f1163d5bec9a5e310b93eab66e5994a 0x7efdda9445123323c512789d9727f48b30ce8ae8 0x7b51fbb7dbb2264703c804c8234a5e2441e5405e 0xa7eea874a1a3e19180aad44912718c35fc0eb5cb 0x0c8ff351a41e4384ea2dc8e0e6f076e3a0e14e96 0x4c050b518b54b55b0f2eaec9ea1963ed56e51c93 0x0ba20f01f57ee4586b3335d03a56ceb3887ce0f3 0x66f66880968f6a21b4571a5f38aaf18a808a1752 0xf4c51357a2e0b74d0528af554f2074fca8da70b6 0xd48faa29ce2288be729dab7ff4502df7d97e9880 0x140367b2986467bd25a5d5cb69114e7f482f58c1 0xd48daa1410a595489dc95b12b5fc769e923e8cba 0x97205fba8e17e32c135aea0b0905b3a340996741 0x69d58f9d3fd020685d615a6e9107107586441043 0xcf2cd2191fb06cb724e5a988ad345bb298b42ab8 0x1d7702f4dcfae6b41b45bff428f75434fec4d3a1 0x668c659b9b124c406c2ad5d216ab62f3bc1fb6b1 0x2bba9bdb0eca17fe98b060f50623a29ed669a4b3 0x51304d8e8525fa78416003b6a44a16dab6ac07e3