ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-49C7E7353CE3
|
Infrastructure Scan
ADDRESS: 0x6a4a62b77cb6b335cf08faccb4b4c19aeb6a4b27
DEPLOYED: 2026-05-01 10:42:35
LAST_TX: 2026-05-01 11:49:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Synchronizing with block height 21823. [FETCH] Hex dump completed. Entropy: 4.97 bit/byte. [SCAN] Mapping ownership-protected functions… [MEM] Tracking pointer 0x229daa20 in memory heap. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Simulation completed. No state corruption detected. [TRACE] Execution path: 58% coverage. [VALID] Comparing result with Triada-Security-Standard. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x86b90192d11bf3eb943f38d4392983688e3b22f2 0xe442a0c567b9e979915390c1ca1939f51a94fcc5 0x98a0b21ac3544f968ff212cc381b0311376278b3 0x083756a85ed0ee0076be99f4b8905e70588f025c 0x5ee2d7398ce35a591c30d736007feda8f4cfec95 0x38e37b2cea4f8696e4643b480e5e8689f27d4978 0x20b672609664d724c5bd86226aca5b8e0f860f82 0x49c9abf453e4aa52ea6b8fcfa414a93e22ba04f2 0xc082b8adbc7e17e711a207c15bf80e2e57492cad 0x8bf6e4719179e43e5608c12cc035dc2ed321a729 0x82547a7a5dd6e3b4a2d13cb9348e6a1729cc6453 0xb524eee77bdc7a6eb71d88a575828d21b729b650 0x0a163efa2da77fe872d07d1e92e940d810d7f6dc 0xb2698a71e26e9908e687673e4ce5d3ad33ea3f29 0x7b50c104263c6a8b44b5630a1a25c284f516a014 0xd9cf9528b45a6963da5caa13b7b7d8a552207a84 0x11dc7f2ecd36b41f1263e440dc08493a74ceaaa0 0xef4c717a74df72cfae97577a46e050384d461d5f 0xe81ce50fd1ee98399eaa2b0bccf360df20f485aa 0x0a5d4bd35468d6475d456673bc85f07331662bed
