ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-69DE06B45C90
|
Infrastructure Scan
ADDRESS: 0x6f03e1fcdce38c47a28f579cb1b667d810fb7689
DEPLOYED: 2026-05-09 12:57:11
LAST_TX: 2026-05-10 01:09:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Connection established. Peer count: 26. [FETCH] Entry point found at offset 0x66a1. [SCAN] Analyzing visibility: 7 public, 6 private methods. [MEM] Virtual memory mapped: 0x0000 -> 0x6022. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Simulation completed. No state corruption detected. [TRACE] Program Counter (PC) synchronized at 7427. [VALID] No critical memory leaks during simulation. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xbda4b95a39477bb269b4f7195d14da17fd4c345c 0x5751bbc70f52dd4cc2294a6031879a1b96720c2c 0xc784751a32450017a015451c9a45b541271a53ef 0xaf1e52927d724fd34773bd53ada57f4c2b742069 0x82e9fed757b7a016814725e803016a4484554169 0x83383e8add303073a4f03d908a17777c188d728e 0xc93a3d7ad53b3665c38b7c03d137acb86321144c 0x1657e95ea1e8ab2dec03d57246bc8615f446b1a9 0xbee938d12c06e281b03ee81f857e16341ba2ead1 0x43402d998c0f3331b1afee4f5c7966facab1db1e 0x3086c72f5907fc32d1dc6e6bb8e1d2efb8af8564 0x173fe7d5d33e27729de552ab059b7acf6717055b 0x102298cc0f2579cdad6d8e135b5106aae4531500 0xeb11201385675d7883acdc517c6686c5362d4ac3 0xd005bf776a48671d8d0479245ddf11649bc42158 0xdae988c9349f079208a3a842552f7ca2cd98822b 0x404be807e07b3730576a5692bcb7b8cd1a75137e 0x1e9a221230877b1cc263ec6a23c93d99496d8b00 0xbb11f7cebc3eef9f1fece34ba900bd3044591a9a 0x9ac54231d4e2cd935bcb390b59d4af2b2d71179e