ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-BB80D08259B1
|
Infrastructure Scan
ADDRESS: 0xcb0443f047a4d48e480bb7c4e21b9cbf96a52343
DEPLOYED: 2026-05-03 11:24:23
LAST_TX: 2026-05-03 16:05:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Fetching raw bytecode for 0xcb0443f047a4d48e480bb7c4e21b9cbf96a52343… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Running static analysis on JUMP instructions… [MEM] Garbage collector: 0.87ms since last run. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Fuzzing input data for 86 iterations. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Finalizing audit report for 0xcb0443f047a4d48e480bb7c4e21b9cbf96a52343. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xcf885ddd3b0e266436214046b7779f194a64629e 0x840a85fca74ee0890dcc3ac7077cdbc5af6ac5e2 0xd56e2febd99db138fb87d42c966b12b92aecf4bf 0x7e07a656728222f0f0d03ba075840d02bfbc0ce5 0x57aa990063b49cabf3ee9feb49dca8dadc9511cd 0xc1cbb07c3a5eaf7761d29093202a7d81e63dfd26 0xedc8a1ad350c554bda5773bdf71f41b2def1d77e 0x70447218b041080f376ac16aadf6dbedca644236 0x2ab3ea379c4a9bbeebe9d5226debaf5074ea6ef3 0x9df0d8ebee12330c2b6a4b12448b59f400439a37 0x437d72de747528a38b6343d5abbaab6284259a6c 0x0e1ea015d84909f76648e6404bf6cbd7b20d4f8b 0xff2713dbc2346c0101904a961c960edda05e0045 0x171297d0536452e1f08bcc9d3f06b6e43e45cc07 0x4fe54e5d590aeba7ed855c317622fc2287a28ec6 0xb21976214e9afb7acd24f178f12958103c246bf2 0x66e0c2d0b7ef30a8f92bae23e3c05b69a36c1533 0x4f8de768e8c33959daf2cd2535a75608a0dfe190 0x8d3bfe056f27fe76f6640de913e683de8c09da5c 0xfe1542e2e71735276ae69ad2ee2e431a2e3d6a7e

