ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-62795245D809
|
Infrastructure Scan
ADDRESS: 0xe60fae7817aeee84f378cde1ea2587795694347e
DEPLOYED: 2026-05-07 19:40:11
LAST_TX: 2026-05-14 14:32:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Latency: 86ms. Protocol: JSON-RPC 2.0. [FETCH] Entry point found at offset 0xf0a3. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Virtual memory mapped: 0x0000 -> 0xe69c. [VULN] Warning: IS_DEBUG_MODE found in storage slot 69. [SIM] State change detected in slot 0x4a. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Comparing result with Triada-Security-Standard. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x1e485d34fa3f2a34216c1f89e9b850bdfa3f2a71 0xfd9337ce8038be32a4460427166ce93994521240 0xcb775d2e24efe447379fd6249870922a327dec41 0x6969b94d4abcd32abe4dbdbf2aa7841928d0000a 0x11c8274fa2259456a5fcea9ae64c1c6512687340 0x6f0873d8a49d77834085aab2e9015746c451f9d2 0x19602d7f71e6cc6186093ec7015b8bd13f90793b 0xb39d4ca31d9a6b4934aba7f76d0d356327629753 0xe56e768360df50d6c5759a6f7f87fb8a112c6674 0x9673d118c54672ac7b1cbbf2397d6dd4b7e45f07 0x48dc423ef9e44a330c6808ff9c003fd98f54a518 0x3856cb65592b09da0acc4987cc801b9f158e4ec6 0x6d695bdc529477f05411c5ad0fad3a619e2b3f14 0xca21c34b5745a5483f72bb3bb14ec825832b5f1b 0x936ea55530572515e2e925ce8f57726afdde20a5 0xad3f5284d42d57a59c001590ae439ed40044fa1a 0x2faaf836b823e0c3c0cbe71c0de7f1eabbade7e7 0x13f0e09272e7d78f398c017a943440336afc34b1 0xa87ce1341bcc24671696077c022f5f21586c1aba 0x3724c1fcf13c36aefb2fa7155fcfe8ecd3da1df9