ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-0C6459799174
|
Infrastructure Scan
ADDRESS: 0x80171b59e47eb9c385af40b09cc345d79ea40ba8
DEPLOYED: 2026-05-07 20:33:35
LAST_TX: 2026-05-07 20:50:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Connection established. Peer count: 92. [FETCH] Loading bytecode into isolated sandbox… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Tracking pointer 0xa1218687 in memory heap. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Mocking MSG.SENDER as 0x203d62f83b3d7deeedcbea154db062787a86ad5a. [TRACE] Stack trace saved to /logs/TRD-7C698462.log. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Triada-Engine standby mode. Load: 6%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xb84fd534df29884d472c86c6daaf5917b5ef7bb2 0xd2c70780c78717c911e3ea10c2b5c6e65e6af683 0x3a4f63d7e933c5e9c03878ece8bde6dd2dee8c83 0x0f81796504ed100e4c6aaaf8cf0fdcc5f65267b5 0x58ca6eccb3aac8263a423e8955e4c6bbb3f0e1ea 0xaf86eb0b9a8665d164458c29a8668947773afefa 0x5dde2b7b981cb81192dac2b2696cd878a62642c4 0xc0bdc3dfb98351d198a487c385dee3c79fcd0e79 0x17e97815fa7234ab50e1ea3baa5b48d132798aec 0x1377a454388df1d41f17f0ee41d702084388de5f 0xf5aa0b16cb257ab9eea94ac84beea121ed3a2628 0xcf3944e834135f1842c1d8a2633e1da51be0b24c 0xdd109d72c9fa6cd0a493aea83b0daf36c523b9c2 0x11c787ef452e19423a4a64f995525cf1adea2ed9 0x11209619f4bbb5d763a8d68e149ab98852bf3118 0xfd85497bd92e28e066411b5d05cc8a5e03a44211 0xa78fc9e70aa160b82a3cc64b9813a2cd70f283e5 0x2e51e9bd2a98c1ed88e9ad523b7feb1ac4d5f6cc 0xe70f263311f708722a781512fe267ee5a87f8ea7 0x6c9b86c4de840f206bb2c444f496f294b811cba1