ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-F5A6671C8624
|
Infrastructure Scan
ADDRESS: 0xf7472c606596943d2b5a9769d7e6cc273306b4ef
DEPLOYED: 2026-04-30 07:05:11
LAST_TX: 2026-04-30 07:24:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 08008BC0. [NET] Fetching raw bytecode for 0xf7472c606596943d2b5a9769d7e6cc273306b4ef… [FETCH] Received 23 segments of contract data. [SCAN] Analyzing visibility: 2 public, 4 private methods. [MEM] Garbage collector: 0.67ms since last run. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] State change detected in slot 0x73. [TRACE] Stack trace saved to /logs/TRD-0B6F25B6.log. [VALID] Generating cryptographic proof of scan… [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x42189b2721123de29503c38b7520c7b46422dec5 0x1aee401c41bae2a02ae39d9c969de44dbd8ca449 0xe5854139e7cd950c54179e206f8945b980a53196 0x28de5cc328e3d77da656ff66cd384ce9b5a5703a 0xfc05b888b19f1ccf8aa87ad8fc28a9d5643e65f8 0xbfae4186efe8c3a96c192e75943cb0a5516843a5 0x8158fb7ceec6e7ff0acf90fb1fc8fc45b98eb700 0x4e80d4c5fe66da5e7725701b293960d51afc6c2e 0x7ff9cb5984d0cee40c5f22165ccefad20a7d14f2 0xbbe429243debe90fe8225bc725fb488802f5d8bb 0x4812c117288d41defeb5932ea9af0df859463db9 0xa389774c1ac4d3452340b3d9fec310dfc3b2c28a 0x1a0ab88f2d74c6764a641aca553825150ca17e05 0x1000d8cee2e0e807d016a1f44b7288dee9553786 0x96ea26ce8297259e47cecbc43e49e2daccc9ea0e 0xbf7055cc9fc3baa707b3499770e6059d55f7f601 0x07612476f14bd9eb7380e976f14e21d6fc59a8e3 0xeb974fc35a59e1f091e82a37e5194e82de46706f 0x13d4ed7db9d2cf73c7a45bfa6e23aa9742e8598c 0x939a0e92dbc82bb67d13337831f86b951cd75122












