ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-856E377A6417
Infrastructure Scan ADDRESS: 0x3436cf21128b3f94c7b06e14f064baf9654eb7c6 DEPLOYED: 2026-05-06 08:34:59 LAST_TX: 2026-05-06 14:53:11 | Compliance Status STATUS: OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling VISIBILITY: ELEVATED_PRIVILEGE_RISK |
◈ OWNER_PRIVILEGE_EXPOSURE An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! | > Execution_Trace_Log [SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Pulling contract state from Alchemy RPC… [FETCH] Bytecode size: 5698 bytes. [SCAN] Searching for ‚DELEGATECALL‘ and ‚SELFDESTRUCT‘ patterns. [MEM] Clearing temporary registers for deep-trace… [VULN] Investigating ‚Unchecked low-level calls’… [SIM] State change detected in slot 0x9f. [TRACE] Call sequence: d429 -> 4a1b -> 210c. [VALID] Finalizing audit report for 0x3436cf21128b3f94c7b06e14f064baf9654eb7c6. [DONE] Report exported to IPFS: c24c6007…cf4ba484. |
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x2496a80b6d8414ba2d6c723cd8944a89bdbcfa71 0xdd40583c1b5959a4098e273faf770453e9caf26f 0x8cbc5f18d62ccbb45b4fc42bcfe4d5d96eb599ee 0x26ae63546655c8ad2bdece3be68ae676dd1cf890 0x5b55343618f46108cdfa17e5dd43fdf564af9da9 0x6ae6918f7b24d151a78ef7a0b5690d8aa906b441 0x2af5886a0a0715b0c1635092e54332701e9cec1c 0x255b918ec65acd2b0d2d117c6347032a6f31c510 0xc04260de76bc009460b8bd9708a7c529d94e8c1b 0x8e3b93f1f21d06f5fd559335437a055c8d942312 0x7d481f0056ce7e05e5e76ee21247866639facf7b 0x54334343ce65a035a5fa18d5f01d8782a47845b0 0xce5d865839fdb0c603d976e10a81de5af6161fac 0x2664ef1ea3263854406bce9f684b24a0c4484d59 0xd3035102c9e094bf317c882b740b890e2811ce1d 0x835bde78d2422033ab4a6a95e146238eb0858522 0x69b47e62ae09ce2866cfd3cf3273df0eb284cd1d 0x6f97d31576deafabab43ed9b6e2b3ebe0c2b422d 0x2d9c82b2d72360e7184b452090ac4be8fff2e83d 0xd6467402bb8aae89fe99308b148bec06210d7e6d
Rate this post


