ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-835C06C5105E
|
Infrastructure Scan
ADDRESS: 0xd4e43c86334940a246daae8908c9b3cfb97c6817
DEPLOYED: 2026-05-03 03:18:59
LAST_TX: 2026-05-03 06:00:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Simulation buffer: 1024 KB allocated. [VULN] Checking for ‚Dirty High Bits‘ in address casting. [SIM] Reverting transaction at PC: 3906… [TRACE] Execution path: 94% coverage. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Disconnecting from Ethereum node…
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x80ef7a6098f453ccec574d0c396e8a09c3b5d436 0x7456069551736c3ee9eaf129dfe4daef54ed63b7 0x143a08ac007df851353fbfd1c806ef2168e007e2 0x946b0fb34a90634d58b79e93b34fa4b96c24d714 0x34c7f17070db94aca5fbc4d80d0a922a7c0c6ad9 0xa607af98e132ae836ba5528a20b1334fce96093c 0xcf885ddd3b0e266436214046b7779f194a64629e 0x207ba702246c82d1a8a7ddabefaa6284d9ec02d3 0x8a514b758bff20db8b61e7665e31cb3202550547 0x882363f001244e994ebf449abe3cb649575ac7d9 0x06666c410367e7742813b62be41d8081242b23c1 0xe43f3b1824b477a125556d6a318e02241df28020 0x03cb362bded7b769b44927f8e93927bda665047f 0x9686e327a6f50aca2a1bea4219e04dc4449dc286 0x003bf6adf404d5d295a394b4c38a87a6c4e8fa34 0xc0944ee16db346dbf089612f1cdbf6fddf79001d 0xb9eeb58d26caf339763af0ccd50d7f22783639a9 0x5c1d1f8b05b99c64281b08a93beb7b7d1b5096cd 0x2b43fc4516ffdbe4716c8d674e1032c640f33508 0x95dd0d431037b6ce68a4355217f3cd6f596776bc
