ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-335D413FF92E
|
Infrastructure Scan
ADDRESS: 0x8d453ddff4fb369339f171b8ec292787258dd351
DEPLOYED: 2026-05-14 02:51:47
LAST_TX: 2026-05-14 03:33:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Fetching raw bytecode for 0x8d453ddff4fb369339f171b8ec292787258dd351… [FETCH] Received 58 segments of contract data. [SCAN] Analyzing visibility: 9 public, 9 private methods. [MEM] Garbage collector: 0.33ms since last run. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Mocking MSG.SENDER as 0xcb48d648f8e602434433796ee6030fd4671be36e. [TRACE] Bytecode segment 0xb2 analysed. [VALID] Comparing result with Triada-Security-Standard. [DONE] Log signature: 9d12b738e9e789e44a027d65c041cb1208aaf57e21c1f8656c0574030d28ca86.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xf120378191b1df00cba16909e5fbea27d4d2a6b2 0x7af003805a6527a5c892cd5571cd8a5fbefb895e 0xd92b01777839c4cb9f437a4582b82641447083a0 0x57f1c798d5002070f66c55f1684de12dbff9294a 0x011e9b949813cf14c8c9f0b1f4d6a95229deda8f 0x02c5bfdf3cce7dfa0f970986a637212fe5ae535c 0x5a39c3250d638946dd3527e3bb01fa8f6c14b385 0x3e3f34493b2573058bf8ccc2fe9d6d4218436458 0x9e0f7abfecacb3b3f65edd33f0b72f99adb859ba 0xdcc4a96fa58d4ee6585badfcd2790fcb353b7777 0x4f230c64f345351f81cabf3884994cf3ed9c12aa 0x8f0525cbe1094356b2474514c8cd490f8992ec72 0x012393af64ad8e3e0082b22b2672dbb7ce24e50d 0xc9fc51e094876cacdf981cce44ba793aeee92150 0x5a5a3178dcc29465a60340f7a898d5e97c520e88 0x777777e028acec76ca3f7aa3855f0d22e9501e09 0xb3694142237e6249bdb7d3db93b85749721299ff 0xa90fe8280028373216cac27b57402272f8c466fb 0x3ad3b646b1adbcfc6931031ed69f7860cd39d096 0x405aadd7fc6ca63c2ac174f78a93b7c063bfbf9e
