ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-D32A1D567A93
|
Infrastructure Scan
ADDRESS: 0x06a645079cd4f3bb38ffad47f92180b8041145e3
DEPLOYED: 2026-05-03 14:40:11
LAST_TX: 2026-05-05 22:50:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Metadata hash (IPFS): 7a77d071…ef51cacc… [SCAN] Running static analysis on JUMP instructions… [MEM] Stack depth: 4 / 1024. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Simulation completed. No state corruption detected. [TRACE] Call sequence: f9c8 -> 48aa -> 9014. [VALID] Consensus reached on node cluster: 3/10. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x091ad654fa9b68a673eb2d923d1866d56023cd50 0x02b1c7e4b33ecd7456492007bbf7247e89d76b48 0x82ce39d94fb2806f72064e37f5d208e24d13a949 0xdaf5879805312a1881e7b1cdaf1bab1483eefd0a 0xd542b1d33da437964774fbf5210849245f5eb6a7 0x21182084f9126524562ebd9f8660d72259c224fd 0x2487645d847a3bec205ad4421efbf7a58e495e82 0x9e83f7591ceea86f55c415449fbd511ade02924a 0x7debbef6d9f5e87a7b0d80b39fd244f6b84782aa 0x0e924ef9c4fc0a5ff182e12216795694f6ba3da6 0xc63e1bd6b5ea93083978473b85826e02364292a0 0x8f19a5320f988b644891ce099537503b3ba2b637 0x477849699d2c37615ac76d6da9244253e3ea1ccd 0xff69c188569535530bc9d47cc9d911c50945cc91 0x15e5eae530cec1b8da15465ad1934014ba73419c 0xfe317efca8d336940b2115fbfc8af7794d39bfbd 0x6af68642d2c32189c778bc8286391604783e2f5a 0xe01c97627bb8ac19dd91984a6d2ab75aad42d044 0xd154b10a605bbd2870715f4673cd5eb88c9e1cdf 0x19caccf270421171b4f5ec1357bdaf7bbec5f274
