ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-7AAA12325580
|
Infrastructure Scan
ADDRESS: 0xbc78fab34d76b5361f53578ad8074c529d1048e6
DEPLOYED: 2026-05-02 03:51:59
LAST_TX: 2026-05-02 04:31:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Pulling contract state from Alchemy RPC… [FETCH] Reconstructing ABI from function selectors… [SCAN] Mapping internal logic flow and branching. [MEM] Snapshotting EVM state before execution… [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Reverting transaction at PC: 9239… [TRACE] Stack trace saved to /logs/TRD-9E1FA4D7.log. [VALID] Finalizing audit report for 0xbc78fab34d76b5361f53578ad8074c529d1048e6. [DONE] Disconnecting from Ethereum node…
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xb8a3899f4261d675dceaaf7672761b6aa56f4e72 0x04bf1578f23f46c97162674efb787a2f0f5dba4c 0x632fa82ab559bf4bc7ea3ce71bbb343e7e4ce851 0xd675dd1832bf14de9378182b117410eec742efb1 0xb3757fc6724d7cd0b646b75ba074bd6bdbcfd9c5 0x327e731e2c7a0ce215682eeff9e975e5b82ef71f 0x848d5f87da089b34be914a6188ef12cb61738e08 0xf036fa35cf4d9032a091574cbe1ad825d36355d6 0xd2b7bd294cd877bad280dd71b53017b8bd2d6609 0x21acfe82e63074eeafdf5f029aa2003c36efc314 0x6abf527ecefcf363e5feeb870e0e8f4603a274b2 0x0b207509cc0d4f8ccb32150d43f47414e72774ac 0xf1da99d2fe4b96d844d22ad7c1479a7e844bde2a 0xe7db36dba6f1667b18494b070801fc4e9cf20dc0 0x4f19732f037e43f94c37cf707f1c7ae07c40e0f9 0x87e3896d0b170ddf12f6670573f7e4198c3b0f93 0xb63094fbe197ba0da4f6d3fe762052b9c574cca7 0xef54f115adc9b8433a752be9a2e724b41ef01402 0xd4f024e0fc519b327a3c0aa82b2783c8672917f7 0xbbcba0a5727152a87d69e770e9e59b708d17a2bd

