ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-BCFC43B5EB90
|
Infrastructure Scan
ADDRESS: 0x9dca4074d595de4bd227579565eeb44c3addb8b7
DEPLOYED: 2026-04-30 10:43:11
LAST_TX: 2026-04-30 11:24:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Connection established. Peer count: 62. [FETCH] Reconstructing ABI from function selectors… [SCAN] Mapping internal logic flow and branching. [MEM] Stack depth: 5 / 1024. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Mocking MSG.SENDER as 0x42b6c6b208a04b5c8ce6be7385fbee97c5be76b2. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] No critical memory leaks during simulation. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x2df3fdafd46631a88de4cb8374708ef1ba6eeb08 0x45322b08891f3fbfdf3a9595babff06e63af7ac8 0x6fe01651c70a2fcc696435573a68487fd67124c6 0x2f9e953290dbee3f01edf327bdfab54f82cf6b6c 0xb3c253895c41c528ac99d3ac8a05d8e37a715484 0xd2efd48a805c12535432a0ffe24e75a9ee17134e 0x34a398f7885237a4926fe3bebcf03539d344bd87 0xa5f2b250e48daf03d4824b3de7519fa1f65284ad 0x3ac8d15d175eedc3d3e8779401b59c05bca8baeb 0x1c151ff6dda030e9279b4635c19f63c510e8acca 0x733ac6b21fb9b3a4625a5c55206a740017ffee48 0x110b20f6a45141325e0554f1f3ac8ada6b69528a 0x79e653fb4be1d500941d7c5ffdf02492dc16e40f 0x2df810b35e5aaaf87690909666535533392c041d 0x24740461c9f9800c5fbab4a0e56acb8f2d27efbd 0x6d56d24139365d35f84b216fbcfdca6f8031b5a6 0x772ea57cbfaea3c678379465f3bf83bd835b91d0 0x1772d06264c006a7b5d8eac4e71ea38915c778af 0x06d5837af79e5aa62b368c438ec37086c3ac25da 0x3ce8a2a13acb0f2f344815baccd3ec8f2ed848f4