ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-135F944B861A
|
Infrastructure Scan
ADDRESS: 0x88a2127a970d90f1bd46ae08bd523509cf8b13c7
DEPLOYED: 2026-05-15 16:07:47
LAST_TX: 2026-05-15 16:41:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Connection established. Peer count: 24. [FETCH] Loading bytecode into isolated sandbox… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Virtual memory mapped: 0x0000 -> 0x2b80. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Reverting transaction at PC: 2819… [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Cross-checking with blacklist database… CLEAN. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x3b07520628f4bb287851503289d88cb8e410a441 0x6a138c84cc7c2496a3816c86281c834d6d79c2de 0xf65db55eee2700afad98000a1a3feca61b859208 0x7606f8e947a49bb1445422a0faecf64ba5d84fa3 0x968cc848071e0e18e053a0dec5fde4929cb67e63 0xac911811595fbd5f8c115086042b446decff8b01 0xf9b8127629e30020fbf061f54b56d5c7fda90b12 0x2362840418c8f42a8c664f2766b76a599a31422e 0x43cd4294788044cc5b4dd90e0ec80e054f30862f 0x8a0f82297a5c8e14d6b978ae967fef934c7c7ecd 0x42de1abef94a33a853df54739ebe479da40ce5ae 0xa8b53f00155c2014043a02b4a890cb55ed89f0e6 0xc72110c1b59ebd83689f2035aa5b0fa9b512c9f8 0xeaf40f0713d06c45cbc687b3f21b895c23740807 0x1ad3b32d25ff8eb7ac8f680b2e7b39545928a635 0x1c8e311cba6b8e2a0257c143abd2955cd9bf4678 0xd5c8c8de48e2480ad6a6442a943ba95d19afbfdc 0xe4739d0ae08a0245f73d0b01002ba9d357c4361f 0xf00803fbbc7cecd917e876f95083a203039acdd9 0x06d9f5e807eeca914482bbd8ed3f40c55ce06c79