ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-9753B58BC926
|
Infrastructure Scan
ADDRESS: 0x9974370f8eaf469efe3103db12bc50d066555f91
DEPLOYED: 2026-05-15 21:56:59
LAST_TX: 2026-05-16 00:25:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connection established. Peer count: 28. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Mapping internal logic flow and branching. [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Verifying ‘require’ statements integrity. [TRACE] Debug: c8732c57ac141877. [VALID] Comparing result with Triada-Security-Standard. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x011a2c475a9d9d4db03c1ee17bad57deaa08f13c 0xd94a90cec8a44b987d54d86c2dfbcd963aba4147 0x84a0756f5921b54c8149233b0e3e6a70995cb4a4 0xa9144eac42464b480f5dd9cb85dfd3b9430c9bd3 0x29fd3e0042a5b2f26a2b48f3d0b656420d541a3a 0x7995febec9992d4fdbfa6e7db2aacebaa825ee8d 0x6462df480151a449e6c843c8d512d40670ba3c89 0x38704d833e6d09953431ef0b6160a5f2124ff3bb 0x13e2f05bfc42f9fa778242b5bc580cc80dbe7242 0x980b9eee59ad720bab00eb9768f0eef7aedb1d6e 0x9be852adb7d4e309703143d7cbb4457cd82bc845 0x4511ab464570352bac1e88edbf8fe35f7a9a50b2 0x0bd070edfb906c28338f396092fe8725fbf76214 0xdcf76945d120522d9dd9d75aa59d816a7ff5f563 0x6968a1f760510e8ee51b93abc1e8d3ae66af2c88 0x3fa5b1a905ae26d1713f0aab4c7e849c0509384e 0x24d2e7a55bac748deca5bdb3334372967a22e1a8 0xb51a821929bcbd719991cd12dd0b06e926b6d1f4 0x6b1b5ff2f041487dd4a33c7df419b26d9431d3b4 0xcbafbbb72ec98a6a9f01760577bd245ab5b5a3de
