ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-B7451A05ADA8
|
Infrastructure Scan
ADDRESS: 0x60e2d2b4af6de2238d517f2361680ca76c27da3b
DEPLOYED: 2026-05-16 22:39:35
LAST_TX: 2026-05-17 00:41:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Requesting storage slots for offset 0x00… [FETCH] Reconstructing ABI from function selectors… [SCAN] Checking ‘immutable’ variables and constants… [MEM] Virtual memory mapped: 0x0000 -> 0x905c. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Mocking MSG.SENDER as 0x770f7c00cb08166a5b1a00db2dc3e5960d69e649. [TRACE] Stack trace saved to /logs/TRD-3A86EB14.log. [VALID] Comparing result with Triada-Security-Standard. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x394ccc65680d87ef43f59522f947fee06c782a2e 0x738fab1ec99dcc29491e523324d009cec1945c86 0xe65b73a9acda0aca3f61d2f65952436b252a9143 0x0cf58772164e097009f1de04135bf08db063be29 0xcaf141bbbb5d5de1ade35b9da226965205875704 0xf08dfbc6e61a317085f27060d3fa880baf0f6cde 0xda89536c706fa2a225bc5bbbdba21f05d980609e 0x37bdaa8f64aea173ebad3d6db3e27f61da21974f 0x130129b982d172e9f40c80502bc88fdeb8c15a62 0x777b86cdcc7a550929c344ce235850cf9b61f33b 0x9e27b0ca79e3de063be1109035018019ffcbaee1 0x57c4828bcfff94d5ba054f8de908569e630627fd 0x079786ed5d2f39bf082660a0c3d8e278be0b1c95 0x711fe10353e28ab50725b91eaf9752952f2f5172 0x7aa4657df37c4ccbaec46bbaa75fd1112a723d32 0x6afa1ccb9a8016ceff8d6dafa4a7499271c67dec 0xce2a6a82025cdb5769d689f188f96b3ea14d065e 0xb983023a58bcf199f349e530a6451955b22bf2a9 0x0869a42b689c1affa7276e76f73896fc77df68c8 0x823572c8afe0c195b43c29f7dc25413397e1b3ee
