ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-A780738AB7F5
|
Infrastructure Scan
ADDRESS: 0x739bd4662d145050ab9993fc615281c8495619a1
DEPLOYED: 2026-05-08 22:23:23
LAST_TX: 2026-05-08 23:21:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Synchronizing with block height 68974. [FETCH] Loading bytecode into isolated sandbox… [SCAN] Identifying function signatures (0x82d6b212). [MEM] Clearing temporary registers for deep-trace… [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Verifying ‘require’ statements integrity. [TRACE] Bytecode segment 0xe5 analysed. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xb191c6d9e1ba6ee6a06c21cc5b2f4889c78387d8 0x34632669fcf626995893e710aeefb2e4f3ec766a 0xcfe2cc4fbacdba89f40a799392a115a94c06910c 0xa90f9f35007bf68aa41aab0d3727675a59e65844 0xf9e826077dd39d6ae92eab18653239898ecf8afb 0xa18aa99b49aef46e807e54a9c5e5e82766533e0f 0xd69fa636110cb7f812eddb4f897f3ffa7995185c 0xb46c5355b6f4bd2ead11d39621001cccd19b9357 0x29f4bd7abec327363d3a64225b831cbe9196d176 0xb2a4b28d31f7f0dd7fdbe8a158ae70bb5f0a20f5 0x55912d4b50e619b0939563ccd6f5401b28ae8829 0xfb6a9c52646d8cfa81a5974354f60b734f2a6a67 0x6ed37f197023339cff5cffdbe5a59ee41792bac6 0x3de39d391057f417210a461a850716dc2c42741c 0x03eb7c21147641938373212aee91ce037f82dbb6 0x12ea8a951ce0cd4c4ae6a09ecb878b6c2affb870 0x23abd02e0847223f13ae4eb05bf65e4ad754f18f 0x6d09d64ec445289ddc7765330adc46b1b44dadaa 0x3ef527d7f511c201536c9b475df55f7f1b77ff6d 0x7dbff01528ac8b1e7c7b75eecfa123962319070a
