ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-ADBC4DCF07C6
|
Infrastructure Scan
ADDRESS: 0x99565e362190e3b738008d4d0fdeddc9404e80ab
DEPLOYED: 2026-05-12 10:25:23
LAST_TX: 2026-05-12 11:06:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Connection established. Peer count: 48. [FETCH] Hex dump completed. Entropy: 2.97 bit/byte. [SCAN] Searching for ‚DELEGATECALL‘ and ‚SELFDESTRUCT‘ patterns. [MEM] Snapshotting EVM state before execution… [VULN] Checking for ‚Dirty High Bits‘ in address casting. [SIM] Simulation completed. No state corruption detected. [TRACE] Call sequence: 91ec -> 258b -> c5e0. [VALID] Security status: DEEP_CORE scan finished. [DONE] Disconnecting from Ethereum node…
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xdb20f867b1bc837a2e53585c3fc03c67b4404eb0 0xedc4a2af154677abc794a9913fd9f1fa3ba76e37 0xffd09deb22780ec0cf31f827743fbf1c042c072e 0x88d268370a0bdd862bdc023171663fd76414f02e 0x108daf65faabc3fc7745ac5baaffe43b95b138b2 0x632f4ea16f5cdd9bd01e01470e41ea88bbd5ec0e 0x628d8a71420da4970af6efe3882e708097a008cb 0xe8534dd608b3a1c0e8931ca18d228be4360b309d 0x70da12c455279ac22d57a2a63a041bdef4d4456c 0x24b428970532eebd074623e2e8087698f9554d87 0x582ec98469270735d9513793ab6ee58f656f2029 0x71c029715369d20c407a3139e75531cd32a14828 0x1b087aa12de0993ceb652918a9ac7ae4011f3444 0x32628dea79b309c15c169594acaf1e39afc1bb58 0x0872432d2fc148b7acb98661b59fd1aa107a4990 0xfc8ab2312c516a906c0d88708aae66a03f5c8c34 0xaa57c47e03e1695e30668d32975be5351fa4bac9 0xa793a02aa769dd0e84731e7e5184c0043f98e4bb 0x8e3bc71be92ec23fcc20f183c405d7ac054f6f8e 0xd0d25bbf58aff8eae8c491067a23bd64cddfdf4a
