ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-7688F39F2826
|
Infrastructure Scan
ADDRESS: 0xe51b18eefbb9c585f114ae7aa383a400196771ed
DEPLOYED: 2026-05-14 15:54:35
LAST_TX: 2026-05-14 16:42:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Mapping peer nodes for transaction trace… [FETCH] Entry point found at offset 0x0d8c. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Virtual memory mapped: 0x0000 -> 0xbf14. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Fuzzing input data for 33 iterations. [TRACE] Debug: 0b329d79e6086f37. [VALID] No critical memory leaks during simulation. [DONE] Triada-Engine standby mode. Load: 2%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x58e0258caf140bf3fb3727caebab5ed7ebc30ff9 0x69de3ddaf94bf0457aacfd0a2f9f8b0cb60af3ce 0x9558270b3583765a52b2a87d2282d6788ac64cb0 0x0c2727c923f90af45e37b2b863a8f517e0148a22 0x8020188c836467075120b8b2e47228515a79d79d 0x8d4c6943afd014836993e616a4c8b48512f72e03 0x50fe04d1124ee861bb274293d8c4bd628ff2645f 0x6d78b42baac34f3947341c52cd84c1dba8c9741a 0xe17b581bd2d0a44f74cc0cc8c92f0cdecfc49fc3 0x3748bd7d0852259da3f03e7bfcdec7602a5f96d2 0x99e9135a38a87d21878721489a8d31f54089afc6 0xa727500af967fa2ec67b0bf74e4ef9d275d1cb51 0xd72f7fd4f01e23042d0ad5ca67e0a69d5f74f101 0xe23b6ef27a7c29841353491baa58c1a49aadc3d1 0x98bd662127e795eaa893ba0030c920643a0d94f3 0x0fa611ab9050c9043a7372839bf54e58c798f524 0x2c50216da4012b9009db0f0bb54f512b7d6b44ea 0x506696ab96dfaf826405a488a3bdda250b948953 0x3d016a37b7d3374d84503d7920c9bba43ce2b1df 0x60dbd6ecb748387c0afe76a14b3abfae1bb61f1a