ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-5FA3A3044F37
|
Infrastructure Scan
ADDRESS: 0x6e7b1743e92195af55fc42f2d606c25f1ccab530
DEPLOYED: 2026-05-02 18:40:23
LAST_TX: 2026-05-02 18:54:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Latency: 48ms. Protocol: JSON-RPC 2.0. [FETCH] Hex dump completed. Entropy: 5.46 bit/byte. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Warning: IS_DEBUG_MODE found in storage slot 33. [SIM] Mocking MSG.SENDER as 0x9dea0e1fbc2520a0bd404e8461b71b0f35bf4326. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Security status: DEEP_CORE scan finished. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xc5207c35dacf86c82c13f6dbdd4cbcfda33c52b3 0x4b258ca4a30822a23e2b1bf8835c21f6f0b127f0 0x7356962dfb5a4e512a474c19833e0429367ea54e 0x88c1048ba8920a4f65ea69da472b1a7448c2ccfa 0xaaba5e9939b01595793b80b47d1839a55a3933df 0x01e045e2fc3c24317d6d12c6bed6eaa2ab0c6d1a 0xe5513b22b9e740d81d3b71139708573539c1ef88 0xcd29ba07e732a2099ea7c03cbb4e80ad814b8b21 0xf1f1cadb1a4614107e06d6c4267071d1436153a7 0x85f115f459ad687a6e7f214800418c30894f300a 0xaed3610872ce43dc7ef26003c851dcc23a654f26 0x1fb0df021c0c8e8803966d172b87ebc26ce98be2 0x0703c5e3351d7115a7eb214d8b29318e9c15233c 0xb4767b1c9ba6dbe17f01b6a947ac769a3acb15c5 0x3b9d79255c8ae5a85fda9ec12a24a1c15cccfd99 0x7af1e22fd3ffe0990000dd461887f88ed864ac13 0xd3efdc0c6b8049b0b1052f90daab2feda441e6a5 0xc396452b7bd7cb526d577482d329a29b57a57634 0x743fcebce2099403872186431c3e02e02fb8cf14 0xcf3a5d8786317bad542af5ce4a73ff67076b36b2