ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-F69C2E2AA217
|
Infrastructure Scan
ADDRESS: 0x57d6e7369281946d7dc9811cedad297601085124
DEPLOYED: 2026-05-13 18:38:11
LAST_TX: 2026-05-13 21:04:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Latency: 64ms. Protocol: JSON-RPC 2.0. [FETCH] Reconstructing ABI from function selectors… [SCAN] Running static analysis on JUMP instructions… [MEM] Virtual memory mapped: 0x0000 -> 0x0347. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Mocking MSG.SENDER as 0x281b9f2623e6e258ad2eb9c4e353eeb00cde318b. [TRACE] Stack trace saved to /logs/TRD-AC0B6430.log. [VALID] Security status: DEEP_CORE scan finished. [DONE] Report exported to IPFS: 195110c6…fb769cfc.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x52ce116607694dd78e62b66e0d6f80e4fad03053 0x7de260feeb8b5eda885561e318bd480916ffc1a7 0xd1f18c2d541338530e3ca1ebf65d1ed1ab81aa6d 0xd513a9ff292968661b85b4c86216e82f53402340 0xe7641b0787883a38d02aa9aa024ecc19c8ead60f 0x028c372ce3810a20363e5b5197a55b723c6de0b6 0x7895b1ac047275fa227c50ad2485a7c2f3b59ddf 0x4610c991c7b8daacbb30133893dca30e2040ba8f 0xee958580584726049e7b4222eca34f91eb51adcc 0xca5246a8468cfec82cbf31472c448bc80876f89b 0x23b7101652c13ecb9c176f15f3d957e37e5b35b1 0xe9680def5330f9308bf2503c47cc6481a2f757da 0xeea57dac37b285c475c64cf1fdf3b78679d63e16 0xb37cc72559ea8f568cf99ecc1b104fbee4734b88 0xf1c534e2db863938996155585596bd0d77aa65aa 0x617fd58f2203706046321e2e988947a014f241ae 0x60f209e541ff48647deb7b0ac9f76f23990c5140 0xac871dc6429fbf1a0c17ccbe2af575f56ad0a172 0xd06afb04b82d2ce2e963683f55a8462236fb8f35 0x7d5c73c3bc2cc20d06b7ce8b8fe4f5af3f9d2a60

Leave a Reply