ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-E35D2D293982
|
Infrastructure Scan
ADDRESS: 0x0fdee10a49f0ec4db3d65babdd4722b9ce7f5240
DEPLOYED: 2026-05-10 18:00:59
LAST_TX: 2026-05-17 05:27:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Connection established. Peer count: 29. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Detecting compiler version: v0.8.25. [MEM] Garbage collector: 0.32ms since last run. [VULN] Checking for ‚Dirty High Bits‘ in address casting. [SIM] Mocking MSG.SENDER as 0x07186289ed11fe7e151484b96e964300277c99b1. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Comparing result with Triada-Security-Standard. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x6aabc07275f5c6a962cff35f3e749f331418bff3 0x520666a27f5fb540506a4821654e72009a4bc1cb 0xe1d12de09b00a66640e0f272cba619e9c26cdae7 0x739806a1593515427d551b364b21863d147b5726 0xdaa991abc945e3ce1c2b4680539241955b60cacf 0x854a55152bf7f165b84b10a19546dadf2f2e72d1 0x43fd4146adf3b718f6d42d0a7d984fc93f5a72ca 0x6c90321d0bcb839b85765447fe8002bc14283a86 0x98cea3caf433ad43c44697bb62f7d7dda21c7733 0xf0a12ebe781f2828a07f0afe756ebfdcf8624a79 0xf08720fa05e28c0d387474752f2f89fc53fc0005 0x948fc6f125afe6e2f608003117197cae88f5e7a8 0x8c6eace212af01c26b82e389dd74e4fa7fdfa9bd 0xafa3188dab6c447a8b413021fa90e74da0524fc5 0x9a533ec15816110922ab623bc105d9d82f0e22c7 0x15750657268df748b54c79edd296475ba424335c 0xd7bdc57ae1bb7bc5324bdbb892665750d88dc44a 0xdab51644e18b036f3c35109fe47ba476de450a9c 0xc0def38cd0ebe8912eba6480d4a29810591e68ee 0xcd1d2a01ded5335697f29e1b1e7eddafe4e3b1d1
