ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-EF3BE210EE70
|
Infrastructure Scan
ADDRESS: 0xd2af2c881e362d04ed8931da8c36a8c0b0da7ebb
DEPLOYED: 2026-05-02 10:06:23
LAST_TX: 2026-05-05 23:58:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: AD6A5E11. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Hex dump completed. Entropy: 9.14 bit/byte. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Virtual memory mapped: 0x0000 -> 0x458f. [VULN] Warning: IS_DEBUG_MODE found in storage slot 78. [SIM] Fuzzing input data for 64 iterations. [TRACE] Stack trace saved to /logs/TRD-2938D9C5.log. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Triada-Engine standby mode. Load: 8%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x3c1fab1b38ca837299bd501d8fe3707d12f93b85 0x24b19bfba54af9d0622cb20ee26311535a4755fb 0x0dfcbd6bbafa9beb62a01ae3219214b3753469f1 0x56f744934414a6033153a80fae3e2ef494a7e549 0x59d3627366a8d1b1519ef7b8bfd33b656e9465e8 0x8c5b07a1e43b6e82f87e1fb6b7d70a039379d881 0x8e82344547667a53eb96a1b14b4ddc30374a8f03 0x255e98cb18f9d6da54233c8552de6b14a8f035a8 0x2147b6775cc16d89fbc6844802fed357f5724b94 0xfa07f5999a6d5c5555fbc126e0b82d65011316d8 0x90eab2428bed5bea1db89f9cff4c100cdffb37a9 0xa961a8f61c8db4e54c0ae9cc819424674e7f6e4c 0x191b1a069552880407996ee00c4a3f47f9145203 0x226697226afbd7d84f60beb84401ced15c5d76b8 0xfd67a67e6d5383645ea34ee7479f906f488b9dd2 0xbf4469944c9b3578a6c00800ff7d35adb276f3c9 0x55c6310d9824df9e1d610b1efb6df6994037a6ec 0xda97444991796ee0c87c4f91160fa5198e0dea6c 0x97bb446911e398c5cc046475b8f4a9d204fc5503 0xf404cba317d45bcf83f6bd4832b8745515f59d68