ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-323D6A1F07A0
|
Infrastructure Scan
ADDRESS: 0x6cb37053152e417e491aff79a632a2c52369a60e
DEPLOYED: 2026-04-27 23:17:11
LAST_TX: 2026-04-29 22:16:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Mapping peer nodes for transaction trace… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Allocating stack frame for EVM simulation… [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Mocking MSG.SENDER as 0xb24504a4b98f42be78f4dc61665eb2de6dfa4532. [TRACE] Debug: 535917e030109f15. [VALID] No critical memory leaks during simulation. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x7722f4e8936c308f58d9295c816909bea4c01fe1 0x52ca7bc43d3e87bfb5d0bed4ab51c61612ccfc24 0x68a091e867c119452e62bacf60b8f09a737ab256 0x97b403733d7cad4aff83b7e79d0875b78a4c070f 0x60a91420c98c8461e20e9a6dda555e21c7bdbffe 0xbfef7ae328be7f773115d838f66d1c5b9bd775cc 0x72ba91b30f4a5d004dfcc1f9057f12c15e22221f 0x62e1a448f7fb97ba3e50de6042be1d9c07a485b9 0x118006c456f142c131daebd9cd5368364e08ce4c 0x49dd3430244654d2fbac34c455733214920d759e 0xcaa1231ce580ef2a8090133c158c652b4df7989a 0xa9050313f69edc3930357cc9415ae56aabd84da2 0xc774b1021d6b0080fde8e021e645138ab234b8dc 0x7d9286fa19250ffdd9b1e31dc82498858244515a 0x4a57148ce935936aab7bf49bf71cfd79bf0cea35 0x171d74f604cf778ef9f23b21357d585fb5d64489 0x5aecb995018fadbf06b1120869378f6b49e040d6 0x5802f451084d3c6bc563b43c121bab631e0f51f4 0x63ffd439a565cc9a63657feb733589230c6264f3 0x75179b3f46de74151c41fdf90be986307ab320fb
