ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-E1A52E6E9D67
|
Infrastructure Scan
ADDRESS: 0x4f6abe239419587600de5292f09ffb1e28010ece
DEPLOYED: 2026-04-28 20:56:47
LAST_TX: 2026-05-04 22:13:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT
EXPOSURE: Verbose_Error_Handling
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] System integrity check: 100% OK. Initializing scan. [NET] Synchronizing with block height 92778. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Running static analysis on JUMP instructions… [MEM] Virtual memory mapped: 0x0000 -> 0xfdd9. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Reverting transaction at PC: 6829… [TRACE] Execution path: 54% coverage. [VALID] No critical memory leaks during simulation. [DONE] Triada-Engine standby mode. Load: 3%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xee91f10b462267a15f818dd879ee0bf734b590f6 0xcb0a42d642d33909ac2efe2c0b2450b38444f934 0xeca94c3ca59f9a24e281a73f3f2a0b6804c8c21e 0x866ef78ae367ca53ae927fe6f30ce8f2e838d4bb 0x1fc3499829781354bc85b638a937ea6da470327f 0xb5080543b0823c89577703c42125d5b74874148a 0xb3df31455851ca2f625bd8bbfb3d318884e08f39 0x1f744628a41f401042d0227268c8276c6a7fed37 0x676d0e62c31213d40e4a9ab3849132fc749fb26c 0x69bbd650ec1dceade8fa988ad774c1f75300c74d 0x5fc175fd83f208f3e97912a8e2c20ff001ca9280 0x731424ab603e84da00c1fa265d4200e430dc326d 0xdf2d2bddcad8fd2fe8b7ac29ae8795ccc1944853 0x2323d98dedc1328e1f4a98456a4b929414245151 0x85bd140fae8bf5a48c2a9df3b89285d1df34f3ee 0x02df47c64e1f62b6a9da1d81524740596669eb7a 0x738da6c4fba026baa3eaf97083626a1649e3e48b 0x1ea35d2737424fcb11df0e5eeedf5243cb06b388 0xb95d6eb6f1a9c367dbfb5c8ea91a7231ca289d2b 0x0de1430ff14e2fcc3e4290cdc8c8d02abc683015
