ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-E31A47B814AE
|
Infrastructure Scan
ADDRESS: 0xca0626917cc79fb22a87fb2eeb76076ecda073b4
DEPLOYED: 2026-05-08 05:55:11
LAST_TX: 2026-05-08 19:13:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Mapping peer nodes for transaction trace… [FETCH] Entry point found at offset 0x3e97. [SCAN] Detecting compiler version: v0.8.89. [MEM] Virtual memory mapped: 0x0000 -> 0xedf1. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Mocking MSG.SENDER as 0xf4d244f8387a8934c2f4d2ddb3a7adc023f293e4. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x43402d998c0f3331b1afee4f5c7966facab1db1e 0xa6a5b64c3cd058b3241ac1f0546f25dc2439e125 0xc387b147bf1660428498b5030c82f80364195e41 0x7e84fa0ead657d581d44d09cd774a2fa638310b5 0x995f3aac8d302c973fa8ebd6b3008c551533f8d3 0x8d61ab034ea3d87ab2776b58b28a10b71687da72 0x2859f82f9a02395bf2bc1c389c153b6118b5b868 0x440241785c15c4f75041f7ad2da671ccba62e8b1 0x6e2a96a033835bd04d1d1d1b23b598b4628b0e98 0x0171589388acfba22e616f53cfed2410bb5fd77c 0x32b9ce4b8ceeb396a419c78d2e89e74a1249a1af 0x60213260d41711c5c70dd11130283cb5736e2c4d 0xea34235b2ed2d6868567edda9488da955f165943 0x09e4c323960f6102ba6126e41141de4d44c39794 0xac62ebb7d4c18de46cc9e64efacda61246fe87c3 0x7f45f3ffaafb9f374e60d5390ff2f860fc709f1c 0x69e5e28fa639cc59913e2d415b268ca20e26a5a1 0x7af003805a6527a5c892cd5571cd8a5fbefb895e 0x7e1fa8ae67eff2fd178946a9e486fe8d92783f85 0xf72ffc9c79b11c3478c2efabf086947a8a256015
Leave a Reply