ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-08CC39702D07
|
Infrastructure Scan
ADDRESS: 0x64cec1b31444dc287eecc722598f3282a4d17e76
DEPLOYED: 2026-05-14 15:42:35
LAST_TX: 2026-05-14 16:40:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Fetching raw bytecode for 0x64cec1b31444dc287eecc722598f3282a4d17e76… [FETCH] Warning: No source code verified on Etherscan. [SCAN] Mapping ownership-protected functions… [MEM] Tracking pointer 0x8d88e1de in memory heap. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Simulation completed. No state corruption detected. [TRACE] Execution path: 93% coverage. [VALID] Security status: DEEP_CORE scan finished. [DONE] Log signature: 33a6975431908da50dfb48283259075ce1e21bb9d0969815e9ed6bba068c94e6.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xe800d6ee7caea48714a8cda09581de11fdf73cb6 0xe558c12cf4dcd42cbcaffac99ab42e4256902984 0x24d65c0caa91f772c37d1eb04734977b2eea634c 0x0e9f01ade4d049bd3d0018a936d46eceecda58d1 0x723c7442449e897b846b3f1057e524da4adb5634 0x8417ce5a87dd381aae3b4d2c05589559ac8882ac 0xe92df7ee8d415f51a0a0ee5fd1ddf8328b6c071b 0x80b1931d101a77a94b288a6ce4f55a70e942ba28 0xddb650757fac5e168014036487c51c775bb2ce49 0x0376bea40c148d8e18817ac3f546e997e0251f8e 0x84ce5f069c530c8d7bc30be40568866d24f6e6d2 0xa06d40075e9f75e51ce97ae6a0fb87d7517d566d 0x9a4e04d594a4c5b7dbbf50138e187c26aaa50873 0x83383e8add303073a4f03d908a17777c188d728e 0xca2dcd6bcfc15818f4ea7df5c5ce710a4afdfa4f 0x7cbf541d81c4b75989649acde55be8e21cf19699 0x917cef22668594bf3459790c1fc88b23a1056974 0x2f55108fec483cd9a5280b72a257ef0e0fabfcd2 0xd71623c25d2504797f1f4be0a4e70e9717921942 0xa98326012c86f9e6c0bce0a05005b0449cf9fca8
