ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-09CA090B1201
|
Infrastructure Scan
ADDRESS: 0x35fff01e251af3bfabaeecbe41e0c1418f4cb2f4
DEPLOYED: 2026-05-13 03:46:23
LAST_TX: 2026-05-15 08:46:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Requesting storage slots for offset 0x00… [FETCH] Entry point found at offset 0x53f2. [SCAN] Identifying function signatures (0xcec6007d). [MEM] Tracking pointer 0x3e003731 in memory heap. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Mocking MSG.SENDER as 0xeef9041262c995ff6655af7f9f65c25eabec2d63. [TRACE] Call sequence: f2b3 -> b5a1 -> 04e6. [VALID] Comparing result with Triada-Security-Standard. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x998d61d4047fa85a35cddea4e363de1ad63e10c0 0xeb11201385675d7883acdc517c6686c5362d4ac3 0xc3b3a5c0394e11cf3d8c8d0ced8146cfe038d808 0x347b5d24eb4c9cff29bf26c049973c0b595eb367 0x568b3848f1a3e01e274fbf40f7451a9a23947e7d 0x8ddb814bfb1e692b4c7c7ac02c103af3982f6438 0xab44c5be461660e7fed5639d77ba13c9ce5c4060 0x3e3e57155b83340aa3cd03a3bd5d5a06ee6b12fa 0x06c55afeafe69bcffc9fdf00611bc545e84428b0 0x613045860ed2c87268e624ddc9b5f8a5b025670b 0xa8cec1c1fcb24d7dff53f4a18052807388695d1f 0xe595d552abd788ec33303f0613bd25b20c8cf3c2 0x2b3499f13cdf78d9a497cad8087c434e5c4a523f 0x4588a80f71731e498b968dd67dcddf20a1b98c9a 0xb14b0d681b31b246d6f91e520b7d4bfaffbc3f21 0x5045724e5ed08b8aecbad98556af326c33299c19 0xb8604960c86e67df2218f482dcc98f93f98119c0 0x14e3373965405ebf5b86e5c51625d3232a11cc90 0x9d3cffa4e0425da89e6ce9e1256c73dceddfb41e 0xd10ee5643af1f7cd88f7c503a2355ce1465dd207