ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-50C85D6467C7
|
Infrastructure Scan
ADDRESS: 0x598342adb23b1a3da2e3899e4e9ebbfc8ad65077
DEPLOYED: 2026-05-13 15:46:59
LAST_TX: 2026-05-13 16:46:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Reconstructing ABI from function selectors… [SCAN] Running static analysis on JUMP instructions… [MEM] Tracking pointer 0x7d0b3dfd in memory heap. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Fuzzing input data for 47 iterations. [TRACE] Debug: 3ad01009497a47e0. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x5d5e31fa1d65830eda11d83ea3b0474315e57ad8 0x3edbb476025bc12d7e5536f013424e34b8a3c47d 0x66eca11a84e9eb708f6c4b3cab8e502ddd0e2dc8 0xc3c6489c6ba08f091fe217533661d6f3e8a95e41 0xda1dd2c275e800ccdfe528acbd657412f79454e4 0x63be9c8999e29da13f77e716d33df96bca59de78 0xab6a6c0fb8e0e1365338033036bf18fe8a0847b6 0xa655c42b1156bdf8a8c4d404728c677112b0e7a3 0xdf9af153981c8983c9aff3251543fb471ad9fbba 0x85392fa93c81509bb85e8497be9b48814858af5d 0xca92c8cfcfc78bb53ed732595e51d7b0eccbd210 0xceddbc857ecba2e599ebca806c693018216519df 0x2b3535dbfa44b1434b1639abb4ec4dc4180e41df 0x936568f42075d05e6fe5266ef1e7c258f8cf3a20 0xc712a2855dd89a559f8ee3d781078c521ea62dd9 0x6addd7368cf76d7202b5c21d045efff11d5dffd9 0x76bd59d143866cdb34987793201774d31513c0d8 0x04b63e49c114e4be3fa4d16707988e2673c43e45 0x2f58f6214cde3737ee1545299e5a3ea1f66aa863 0xf66814dcd49bac31fb7b19c65a7ce6d5109403b5