ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-6BFD4D2FA0F3
|
Infrastructure Scan
ADDRESS: 0xb518d0b48cb6293f7f86a53bf63592a870529129
DEPLOYED: 2026-05-16 04:48:47
LAST_TX: 2026-05-16 05:05:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Mapping peer nodes for transaction trace… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Mapping internal logic flow and branching. [MEM] Allocating stack frame for EVM simulation… [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Reverting transaction at PC: 1842… [TRACE] Return data: 0x3487b636… [VALID] Finalizing audit report for 0xb518d0b48cb6293f7f86a53bf63592a870529129. [DONE] Report exported to IPFS: 8a304955…f5c354be.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x35d8dafb84a25a97e70741df3f3d5befa4d882b0 0x1063ee36ec4c9dde9a80d3b244694aa57e7e2a29 0x8a71770168b176851d0dd9338f2de282d4f958e2 0x8fec5be53ad096fde5e11be54c9222f63c3a39b0 0x5841261ac90e186e654a5639ca71426ee515788c 0x1870ccad9b9706861f9112c0e699c90db54c957c 0x57af42fa2e337cf215ffea18cbafeb2575dfc54a 0x7b1d4a7253e9cf73ea0d7cd21a42ef460c51e671 0x0376bea40c148d8e18817ac3f546e997e0251f8e 0x3a9c1f8703fbea3e0895df5200ded305444d4b71 0x51dd050852783adada47d6d2714c3b660382267e 0xe81e5a9105eca5a75624e1b856028d13b71f65bb 0x55b38d9790c933ca221d12e185438b196290a14e 0xc7997619475857a77026a75605555538d7856fc0 0x898199df0c804633c626a1048ef4b84fe5846e02 0x699179de705d38cb475a7ab99c64abeffe4aab13 0xc2a313815c93b31498e0cca55ca9aaf88adba57c 0xaef2fe972699d75a93eeaa19609c3f39ac089d39 0xad5a2375e2507639db00f7338c4a5a58d269d533 0x1dd1c462f47a2a43fe15eb88343530e9e5ad86b6