ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-B9CF63A75C85
|
Infrastructure Scan
ADDRESS: 0x4a1724007c6b0904b945289640138a96fff00511
DEPLOYED: 2026-04-27 05:02:23
LAST_TX: 2026-04-29 04:58:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Fetching raw bytecode for 0x4a1724007c6b0904b945289640138a96fff00511… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Identifying function signatures (0x98390f5d). [MEM] Initializing storage slot tracker… [VULN] Potential ‘Dos with Gas Limit’ in loops found. [SIM] Testing edge case: Zero-address transfer… [TRACE] Call sequence: b22b -> 34ca -> 102a. [VALID] Generating cryptographic proof of scan… [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xb4c9a4a094bd6765b79961a887e4db52eb104ec3 0x49222ec5718ef5310b9e4e654bba918108f93e22 0xd1c3e6ee792d306323cf3e9e4461a86834b3e44f 0x0f427126546e67708ba945b392462ce60bd7daed 0x6d85e9eadb582b240c69ced3153b25c0cdfbe4d2 0xc6a763a76a1fb667619f173262eaa713f78685b1 0x9545fd5fecd1d11f2246bad5c20a81f2f51b922f 0x1f5f48ed751097ea7c89995c6c5cf461ea1cfb3b 0x956f7e1ebc3a829269f8adcf760e1257a845c56f 0x0ecb5725cb97f1c340d3801a45361e2881e768c6 0x4919b6bdc611cc79aecee135c0c5b1d187573532 0x48254f92724e4fb9424b1d45c09b9b996f77d10c 0x26c843a09cb14fcea7fdc01da99913e3bf83adf8 0x0603e9052f26b648e2dd7ae3314fa9dedd3a6b7b 0x60217384197405fb4f02f360a442cab48dce26bb 0x384eed18e65721031740132e36b31eda4e3fe6ba 0x6bd9b7024fa8347beddea1542e37c5de6132c4f6 0x54c6d77040fb70b49bd0467759c1425b96f6288a 0xcd10cb5049a316434daf71321f7cdce59c96ac61 0x5b0c23ea326757be75ccf9a6c8fb0b20c67250c4