ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-65F6D8FAACE7
|
Infrastructure Scan
ADDRESS: 0x41cc011e768b2859f2aba42551762a2a17b26fed
DEPLOYED: 2026-05-07 09:42:23
LAST_TX: 2026-05-14 02:23:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Mapping peer nodes for transaction trace… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Checking ‚immutable‘ variables and constants… [MEM] Snapshotting EVM state before execution… [VULN] Warning: IS_DEBUG_MODE found in storage slot 40. [SIM] Mocking MSG.SENDER as 0xe56fabb4769d3dfac46009d7e7ba96de5b456feb. [TRACE] Bytecode segment 0x0a analysed. [VALID] Signature verification: 0xa5c017fd7fe49198e96f3c7bab251bd58e85c9e7207fafc8a675d62ec86ac1ea. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xa41780044545904f40dc66283dacd91b7da7c0f2 0x26f3e16d39e44ad4eca6fac9a97c7764944bfc86 0x0baa6afc08514ac5826e7217a482adc046d88db9 0x970b6b2e2cbd84c4c0a58abec0784d9b346af253 0x514ea5fb83cf7e1577dcfec2046339941f8e31cb 0xa432d6d9437cd477c44a29a864ca0d77192d1d02 0x6db1ca59405a05cf5052fac2376cb327bf3b31f2 0xb2efb025e1bb95aea82997ad793579fb2635e3b7 0x9dbda847caf12888a827027a50a6ad8903c443e9 0x1bb80d991db8b42dc25a45050290f8d6bc09cd63 0x4faea0c8cf0b8e95704ffb773012aab77d097ea1 0x10fa2e1aabffe9a6ea1946872abd7867d7f3be0d 0x66ed15df1befccccad6a01f28f7356001ddee19d 0xdd55cdb181cc282527fbc70784cf0eadedfc4793 0xf1687b5fde70187f41a9e2df59e2c80a4fe74840 0x3fc368f21dd1dd50ce3462e75b86efb8b2d8f216 0x3474d6984c67f41be0cfd1fad681536dde5ad4e6 0x7d1fe3cdeda8b96e0614d9c7cf65bd3469f22461 0x4684b2f4f9ac9d7a430e6b3185f7512ded4b03b0 0xbdb53df69dcd356c3ee468bc6d601f3bf0d9e2c4