ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-7014AB8B4106
|
Infrastructure Scan
ADDRESS: 0x0476aa6d20f86d47cd454b19012e0ae9f5cf8b36
DEPLOYED: 2026-04-30 14:30:23
LAST_TX: 2026-04-30 14:49:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Connection established. Peer count: 70. [FETCH] Received 77 segments of contract data. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Simulation buffer: 1024 KB allocated. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Fuzzing input data for 18 iterations. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Security status: DEEP_CORE scan finished. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xcd928155797b1749efdc978ba5d96046679b2328 0x56a5dad118e12b43925275d22d0c44a4f9709608 0xa8ccb12e68423dcf72730ff43c7bd891f5dcdc99 0x181be09ffc6c8ca7e41db0089b8c80481ce99329 0x3519f4c0fdfc73e783b8f6d883cccf5281288e82 0x6222eb7520508bc61b74a1365fdfa91e9cc2329f 0xa905f22e11d05c2370a45e450ddb6d9b4b691505 0xf68c3d675decc11b709b442585a4259285d11f33 0xba4599e951009424150743be1a2ed58327ecb14b 0xda435b094243f3e3e1cdf83a40ee4047da1a371c 0x33e6c95f04b4b6957c5ea38d6b5318e136b2743c 0x32e6d596208919709da77ae5b2e43dbbb109ac3f 0x29f0864d2084a215ac6f46c4a7254dda4f49e997 0x3bf3ced4bb3f34bfb687a57450b405bb0cbaa5b7 0x85abd997df998df17580a6be85e957decb582aeb 0x56103c385a147ba5dde6c8ad0a24f7579f280972 0xc22647c29762aedb5b56476eccde0acfcd4e4b4a 0x04f94151f802fcbec81e36eff953736d7a353f91 0x465bb5804d4c9e7f6066582bce8779fdc71e6bfc 0x08448d3b100c7e52633763ecc1a02af08de6e599
