ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-45399B1F7AC9
|
Infrastructure Scan
ADDRESS: 0xb2263a43ab937ea2a7f5ef492b39f90bb7bc83e3
DEPLOYED: 2026-04-30 13:00:47
LAST_TX: 2026-05-02 23:47:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: A353E35C. [NET] Mapping peer nodes for transaction trace… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Checking ‘immutable’ variables and constants… [MEM] Simulation buffer: 1024 KB allocated. [VULN] Warning: IS_DEBUG_MODE found in storage slot 70. [SIM] Verifying ‘require’ statements integrity. [TRACE] Call sequence: 6d28 -> 2287 -> d882. [VALID] Generating cryptographic proof of scan… [DONE] Triada-Engine standby mode. Load: 7%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xefbe9ffde91ff4eab4f94e26be2dba85d9c01f28 0x2b830fdf5c1ba98197b20c1b1757399db1d99873 0x0b748a774f9888c65f651b6cf16b5ff7c104b717 0x7bac254db9d168eab1e413d84f69a9978da48248 0x29ba3297c721ed2766dc7206b219e48091b5d031 0x612ca8e31428a65c704dd9b23e26f065cdb3fbb1 0xb5d96d4bcfe79dd28efa071ad92c697f17bf2732 0xe82891794dea0513b4e04df88db4ae8784e37fff 0x488edd4fd018fcbb97b8225bc2c4d3d824c62674 0x9568556ffeab54f415385e9b90ce3240719b2846 0xf7173862a2fdbd66193d5220d89be37f70b2707f 0x4f88034b51381e8978b3ab3b801aa7f3a4095dae 0x74bba092b4b38f2abe717f1f90f1786d32032811 0xb5c50c5d5f038404f85970b7f5b7259c4ac0e198 0x666ae535b4aa0a42532c64719123c5ef46ee5b19 0x21d2ac8a498b6b3cfeb97d1e8a0f6199671578fd 0x4f6d60ed60a9b44fdb09e6e7d9f6cf77825538bd 0xe8195dac6db150c0a167b194ba8bb0db20929c72 0x5faa5082fe6550a31e38dc8085596ad5299f6737 0x94c09553896ce56ac90589a14f1744cf310c7c13