ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-E8111A853842
|
Infrastructure Scan
ADDRESS: 0x6e5eef452a3c79519b0e15b826c44000741f9a01
DEPLOYED: 2026-05-15 05:33:35
LAST_TX: 2026-05-15 11:37:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Mapping peer nodes for transaction trace… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Checking ‘immutable’ variables and constants… [MEM] Allocating stack frame for EVM simulation… [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Mocking MSG.SENDER as 0x8dbbfaea0172c7d9753aabf4ab0b63c298af48d2. [TRACE] Execution path: 31% coverage. [VALID] Signature verification: 0x68a618a526ba544e0a7a45fcd886349fd296fddb5dd41931a7dbd04fee06aa4d. [DONE] Triada-Engine standby mode. Load: 7%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x06bd8c8c1af4f983dfc78b15c3dcbe14b69b2626 0x03fdba0eb64d12cc91fa3c0a20a2e9988df6be0d 0x6e34c87218962d1aeba336d4aeef26fe72e9773a 0x019697e7832dba533c320c0e2a36faa2da958de9 0x32fee0d26845d67cedabe380d5abc3922d877d41 0x3a41555a23f6f96a48a1cad66559bda855418f49 0xd1d1062d447c50e95a30a0140c36eab5e0da40d3 0x834d734744e4b6f9ebda10613ee3462639bbc42f 0x6c2163566ff4742856fceccafc60c75f1c6b8de7 0x0a2026b6ebbdee499a4ef0259f2d82819cca9ff5 0x0a6972abaf7b8e4f66b2971f906cf05dba086c5e 0x017b5beaf6f8297ec563ce7bf885e9dd0bda2ce6 0x4afe3f91daa2c27baf2ef943d88151b45842475a 0xb340d50a03f56eef640bef46e1beea7c884b7bd7 0xe02c5de35806d5dfba13e3345c2d5801d81ab9ca 0x5d75382286b35666c70e6534b5f78e508e6d60ee 0x86d27132cd752a8b7ebe22fdd62ee95a6cd06a56 0xef35e81e4516850ae1e5a06f886cad70d4f2e888 0xfcf675cd1d46a1cb10e907283d95f9f47b39afd1 0x4c884c4a414afd457b1d6448fca6d5d9a699a2a7
Leave a Reply