ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-5F5683F261AD
|
Infrastructure Scan
ADDRESS: 0x19222eb4bb885ad990d8df2a2ad3f6e64cbebf00
DEPLOYED: 2026-04-23 20:40:23
LAST_TX: 2026-04-30 03:08:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 128B6127. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Stack depth: 8 / 1024. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Mocking MSG.SENDER as 0x4de045fc61862d4a82f0141853a87c88ea2ddf1b. [TRACE] Execution path: 17% coverage. [VALID] Comparing result with Triada-Security-Standard. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xd66f9581c5379d40e36d3aec79d5d5c6f4973e4b 0x3cb0fc722b462f864b6738c9d6cd591d0603ceb3 0x51053ab895e873c346df06a8e963e61f30c625e1 0xfbf17097cdef7b84be3125eae4f8f6247d1f5fb6 0x307f24260e2c889a4ecf558b0f2ec3471e6ac6f3 0xbdf252d3deeeb31229908def9f4992b250aa69e5 0x5d5a65910333c8d0ced1f1a5921af30a2263fb9c 0xd0899d15aa965ee835c08869363258ee708e18f1 0x1b3cc5efb5559b00c32030c95eb91684e2df5fce 0xdcfb21798b450af02ca760c8473f476ccd876d82 0x4ab2217002be0170e3e0a5edd582385e29ef4b95 0x78733f72b84c866ac7aae482dd48048570e2218f 0x05c9d5f8800aebcd3166384f2896bd4e65eeece1 0xebaee1946742bb41af1ca47d7572797f034f7a20 0x10367d1a9412ffc3e6f900441452e3375caad1fe 0xd9a4ca84761837213119b775a5c6b3e03b1f21aa 0x5e2debe47d3fb95cb4eb22daef848f48dcc67a03 0xafc0f05e2ec8a1f3a93b3a15b706d1524e3e5e4f 0x558f3d36b1bdcfc7ff32297cd1fdabd144c12fe2 0x684469f26b17795006c8a4f11fd0b5aa7454e2bd
