ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-9E4F03E3E9FB
|
Infrastructure Scan
ADDRESS: 0x3a32e8c643213e9abd848dc62966bb3133f5fffa
DEPLOYED: 2026-05-07 17:08:59
LAST_TX: 2026-05-07 19:00:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Mapping peer nodes for transaction trace… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Mapping internal logic flow and branching. [MEM] Initializing storage slot tracker… [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Fuzzing input data for 97 iterations. [TRACE] Bytecode segment 0xc7 analysed. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x1d7b69e1086444c1879be6404ae69ce2a8ff0ecc 0x6c95a81065eadf727166ccf7eb5f96a03feef25f 0xdb3f7f9d85173063246e71f71797a6011dcf4556 0x6e62d685efef62dbbe30bbeadf5365bc3bfa4ac7 0x5ba49f92d056a859f2a630e13fa3690d4708b756 0xc9fc51e094876cacdf981cce44ba793aeee92150 0xf5b5d6e4ea33c4423f9a905fc97af4de31d9d72b 0x85dae781fd308ea3029396a6f3ab67480faca1f8 0xf3ccd9d8dc08c5b93a2e6e9293f4890aa17b8ed7 0x0205681399c3704ac2fb717e169fdaaa7993e8ee 0x804e178be2a4d1241937ce0d9d3695bee0749099 0x8e824af993f6d0d3272949f5af9403d30470f7bf 0xe03b6fb5f431884922e79be66c4e3bf914dad9df 0x35e534e5fe7518aa6a7951d7c722711419d5aa2b 0x31c9878966eabb22d4648cf258fc481295d28abe 0x7b2894f9bfc4f20dd55a9f33320ae175567029ee 0x5795198fe1228273505b7c5758f4b9434d224d6c 0x9029bc7b5c9d74ed26eaa6896062342d7bd19818 0xc72a0ff8e63018b6499fa832f3a0c9f5c51dac12 0xa7cf9273c6b6e086a4b84f50e9c53dc049bb23ab
