ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-07850DDCF7F1
|
Infrastructure Scan
ADDRESS: 0x1cc5659764fe5f750919a4af264145a4013f419a
DEPLOYED: 2026-05-16 01:28:59
LAST_TX: 2026-05-16 01:53:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 84934363. [NET] Pulling contract state from Alchemy RPC… [FETCH] Metadata hash (IPFS): 7f273478…8f87f0b1… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Allocating stack frame for EVM simulation… [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] State change detected in slot 0x93. [TRACE] Call sequence: ed8e -> f4c6 -> ba64. [VALID] Consensus reached on node cluster: 1/10. [DONE] Scan task 84934363 finished in 45s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x73c1978214629f2a13ab497d4436c99768ae195b 0x758850ff622fea32f322596346637f7dddac43ff 0x7b22b4e919c96d44db0e76d2a124e7a9cdd56faa 0x7f23ebc472c95a041ff86671d93038b7ecf73a13 0x43cbe18779dfb2dc363280c205ee952dd3ab705f 0x2d7611d3722840266be05bb5715c4b882c7ed732 0xc7741dbb7b14fc4a88933cbce4e2a6014fb45c2e 0x59a0b4121539a832d9bbdf83f8f50c75cf903801 0x20bb77ebfd0f23103abfac4607332bd782bd2c70 0xddad2d3e7c18b204c72c07c7a3233d13ac63f36e 0x3a781d7dce38905745428d29063b66149cca3284 0x92160625eebad2de2cab8b3669ce1765e531e5ed 0x293b2d54482cbb194ae258d4507ad98b26364eaf 0xce31f6ca2d365e125aad04fa904ff30ff687cd1c 0x70a0ae4a5208bfe2c1856db1a6d5ce76454b865a 0xb9175e8f2ad7ef55f1af78e6d1571a786ef44565 0x97bf1fc5ee72dd8c9686386ff00c99b6e3b9c00d 0x3db3e1b15eb166b3f05b072645ad4f6937ea381b 0x8018f4096de6b9bcfb82dcaf3b852973fc9a14d1 0x42b3ccf2eb814aa39ec346c43ea97b6ab040c7c8
