ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-B11F865E4F13
|
Infrastructure Scan
ADDRESS: 0xe1ad4bb11b6801159b54111a19e1836355cb717a
DEPLOYED: 2026-05-10 16:17:47
LAST_TX: 2026-05-10 16:33:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connection established. Peer count: 40. [FETCH] Bytecode size: 8405 bytes. [SCAN] Identifying function signatures (0x404ca92e). [MEM] Virtual memory mapped: 0x0000 -> 0x0351. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Testing edge case: Zero-address transfer… [TRACE] Debug: cefc25f5b2971b6d. [VALID] Security status: DEEP_CORE scan finished. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xf08c670bd8819fca0dcb3c95d82c164384fe4705 0xda1dd2c275e800ccdfe528acbd657412f79454e4 0x926635fbf47c9253fc608c99b0120b71170b8353 0x147c5a33ec1ecd2698ec19a1bea9f0d2a26064dd 0xfbbfdfa9f311e751e976b6243381ddc4016c4253 0xedab679892c4664aea00fc1bc58ec22418eb8cd2 0xf1b253357d88a8170ad8190e2ab64147b226300f 0x6874279371af0a1dd5bfb73a2969b023e8444cd3 0x03739464d3ce877b2ba39b2bdc6797098c4eef04 0x0d4dabee88297363116e609797bd4691203cd33d 0xf39bb87bd9745a33a31510d26c52a4ef6193e6a3 0x64ef17371d2f221c0f0a032f030afccc807d639e 0xdd003601101592f778a2d7c3c8896a84212887c1 0x0159488e7c1e020723376dc1d05c0e08e1e9cca1 0xfdfaaa5ef2e31843e36e64b66c9de93ff579a8ac 0x40d32e6e55809dc900206361d34ee0bf6f73ffce 0xbe589921cd8e20e4d9aa040905e214643637efcf 0xe825ceda5f2b44fba70fb04a7dacd436ac8002f4 0x38670ac70adb85b8ac4425a8ae54b080f228eef1 0x8a1b34401fc81a85304636008b013a4b6b7b759c