ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-AF743F741E58
|
Infrastructure Scan
ADDRESS: 0xd754fb24a8c0517d51d1e522707bc92ede367024
DEPLOYED: 2026-05-14 19:55:11
LAST_TX: 2026-05-14 20:35:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Handshake with node 0x566423fc successful. [FETCH] Metadata hash (IPFS): cbbb38dc…48004a2e… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Tracking pointer 0x528e79bc in memory heap. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Mocking MSG.SENDER as 0x3a0273b4976ed4aae6a3e873bcdbe256189e0347. [TRACE] Debug: 432f67ac68278cb5. [VALID] Comparing result with Triada-Security-Standard. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xaa38bb9d3795980f1ebd2868ee7b233682b012e9 0x4a2fb202d16b1bc247f758d519b0a29fdf055777 0xff463e4d5d8c0444ab431d86e8632c13dfd67990 0x69488923321cb7b0821695cbd6c2c7028a171e72 0x508883ffc8403f12ffadbf7ec1877c03df807789 0xed091b9bec3aad501ea517782f7d56fafd551d86 0x8e82617012d208c75f2117689acdec0a0b688d48 0x3126fd64abd11f2282b4d49cc4cf1aca70cfc061 0x93d30f721f9f858659c7f76369c7af1a1649dba3 0x07fa0af36396e40b6eccae319a73d07bab347ebc 0xdee58adabc1cc4fe7dc7fd10b3778fd2d2858977 0x85e3b1f44e9d94b6019464c9970686579752ff95 0x36569d9afafc8bfd6bb844ee371f401c695f1bf6 0xcbeefacb2a195a6b6d8baeb11f194e56768fb26a 0xd069c5e306e0338b4bc4ed4e9eb9310032a7ca4e 0x136716ae515f4dbad4a425d3d316a65db6e59ce6 0x004481877a3dd831d781f4f40e14116f6421dae8 0x961f3cace959f295be142b59851ad2abb1e7c0f8 0x7e681a6be17eb4341a9389059ebbe3158ee465e5 0xf15bea0eee796462e181eb928e1231ce64cd677e