ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-9D7E67C93F02
|
Infrastructure Scan
ADDRESS: 0xd85a54b21559a9f4828638b05dfa5a949b93d01e
DEPLOYED: 2026-04-29 19:55:11
LAST_TX: 2026-04-29 21:23:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Hex dump completed. Entropy: 8.94 bit/byte. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Snapshotting EVM state before execution… [VULN] Warning: IS_DEBUG_MODE found in storage slot 88. [SIM] State change detected in slot 0x09. [TRACE] Execution path: 76% coverage. [VALID] Signature verification: 0x662286b5409daef0a049ac8bd719d87f003a3427c2453311271d1ee5202cb7ee. [DONE] Triada-Engine standby mode. Load: 8%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xe68cfa67ee534b32e1319a067dfaf344cbf3b5fd 0x2329ee19477adc39507177d5947891e26a4978b4 0xa905f22e11d05c2370a45e450ddb6d9b4b691505 0xc9bf3f1d072a4ad140fe91c7eb2d50f0579b8996 0xe3f59c5fc34af9120b5ae8bd4760282b7c5cb400 0x179b870dd82ef26d5d32c88282748791b542b22d 0x214aab090cc95122705a3d3538662afa43e75f13 0x88c9c569047f3dfae4aaf8e99a51243cb304c18c 0xcf5e436dc8280612e969b82f9b39b6f66380d30d 0x917c7f3ae83ec9389a399ba0b359345093d8336a 0x644cdd139bc259c38a05dc4676126cd8fb9a9d0b 0x68e5dc87e3a5e9004e01f9c1c4615c14440006f4 0x84d3893d43282498401116870bb4279d93f412ad 0xe728b456e0912e825788930d7067f67015e953fe 0x332c4e449408ddfeeb27f0115879da5100e564d6 0x6aff08e2b203514d36be5315bb7d4cfe1bb56a8c 0x936c32d20e60606eb3da83b30070f155df5d6c24 0x9af7fe6bd2b4b8406257032cc2c0338868aded3e 0x56510ad7ad4b76c7395d121d4665f5c740174f29 0x02490f3c56bc7d9af4a8308c6e58b84c72323888
Leave a Reply