ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-17F2A24BEC09
|
Infrastructure Scan
ADDRESS: 0x3ed378b04e920024f473a28443ac350412e25c7f
DEPLOYED: 2026-04-27 08:17:35
LAST_TX: 2026-04-29 06:08:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Mapping peer nodes for transaction trace… [FETCH] Received 45 segments of contract data. [SCAN] Running static analysis on JUMP instructions… [MEM] Virtual memory mapped: 0x0000 -> 0x771c. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Gas used: 93507 units. Result: SUCCESS. [TRACE] Stack trace saved to /logs/TRD-A4200C47.log. [VALID] Security status: DEEP_CORE scan finished. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x89e5529c3274571327eaaba10f4e12ec36b00628 0xe19ada676afb7cf7ff062200b035ec0695f82042 0x17201b79a444495b939c631cbdb1c0257f464ae9 0xfc275490442a95c228b578a7b0bcbbb84df95ce7 0x4ba7d2e19f843f0933ab1729da909dfe83100776 0x5e7f8ec09e04f8b4f36711e08275ae2c9826c18b 0x18ec72798bd67c876a8c9512f1ac88cb97c160e2 0x381489b5dce39db458cd8c35b16e288040b3f1ee 0x42a30d0cfe93ea416d7ff08632fb082bb641aeb6 0x6d9af78a7a8c25d5599d59eda5437682e8c95a40 0xf1da99d2fe4b96d844d22ad7c1479a7e844bde2a 0x823d2522b04b5a555e3f9a4ba42932183e2b89d4 0xb119bff557fda359dcc66267cf76698015a51775 0xbb8a62602a501d9e8ca7bd2c38693ef03711c800 0x05a7599bdbb5024fe82f265510dde032de86bd41 0x5ac08cfe3607344d9b7a93f9422dbcc45e89256e 0x11c4ec2a80af1825f715c9f3a62e4695db82ef5b 0xfb477e4060141018e84bc0c23777a35ca72581ea 0x7064f0980fc57ded5862dd90dc0e73e6ddc3ba16 0xf3b195da77c536d4477cbec2dbc1498804cb0fce