ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-693DAB8E4A8C
|
Infrastructure Scan
ADDRESS: 0x4a9f1280a7c8ece691910938c3043376ba1ba1f5
DEPLOYED: 2026-05-11 12:47:11
LAST_TX: 2026-05-12 15:29:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] System integrity check: 100% OK. Initializing scan. [NET] Connection established. Peer count: 37. [FETCH] Loading bytecode into isolated sandbox… [SCAN] Running static analysis on JUMP instructions… [MEM] Tracking pointer 0x7d9f8739 in memory heap. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Reverting transaction at PC: 7082… [TRACE] Execution path: 27% coverage. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Triada-Engine standby mode. Load: 5%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xf0921e2423cc39e4ed39a5bdb338516f7b781773 0xb61948fbbfa1f0421680491e2b17929597617c6f 0xd2525e9b829fe0ad4dc8fd64253f5709fb82ba19 0x46f4b0d459f36123cf3bc86b1f3df4a1c5da908b 0xdebd16fd88e5089edd9e2e13a0bc724a6d935bd6 0xf069d90dfc5aec35224ba37b99dece1d91f8f998 0xa016541cce94534c64cf3862c11f6aecfe2ce747 0x2b150ee294e8bff39aa686ceb04ffc0b791963d7 0x83b747bf66bbf1b0efea03faa13ee2d423e48043 0x2110f8b01b3e7cb36d0eb0c403a7441994631f2e 0xca7d1db3589fccf3df1bc6f37033ed84bb54cc5e 0xdaef5b40d9d6aafbe7e6e804ff477a121568ac4f 0xc6414270af17c44c805fc4783b2f4fd6ae8d2c06 0x9fb3976425f6ca16386dd1c32a40f013065176ad 0xbb4ff4273f4b403290cd02500ff0e4ee2493f959 0x47ce3494d6825d6d80386b9a67ef53a56cbcfb66 0x8af6c6340e41212a268a2de4b2d9a32ad28e48d8 0xb2c7aec0b8d6e8ef3205bb2e114657ddbd91adf3 0xf8d116750876ea55405f017ce456e5ced4ab4219 0x9e32be1b3fd9bf81fa20a1ebc891c5eef8de5d41

