ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-09A1339E8DDC
|
Infrastructure Scan
ADDRESS: 0xd8e7259bf216d117ceb9f33ca91df5283f429263
DEPLOYED: 2026-05-07 10:49:35
LAST_TX: 2026-05-09 06:21:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Connection established. Peer count: 35. [FETCH] Reconstructing ABI from function selectors… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Virtual memory mapped: 0x0000 -> 0x9e60. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Verifying ‘require’ statements integrity. [TRACE] Bytecode segment 0x84 analysed. [VALID] Consensus reached on node cluster: 1/10. [DONE] Triada-Engine standby mode. Load: 8%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x6474cf0ad5ee3efdaa48e779bee7335df48c1daf 0x1364f6bafd7c6cf720175337d4866d2b5dfcff4f 0xc9b167f94a4167d14bf6077f1544d510e7e0413e 0x71b3eb452e46193fb7248799156b4e5ea1a2cfda 0xbe20ede0c58c1dc8fecd716bd8be84dc623dfef1 0x6f16f3a460854af8923f592cb1e593947de1acd1 0x4b4217820c75ea9a7f454d10d93ea893fc29904c 0xbb74fc1bd36a0ed017223aa4b0057a6a9941eb32 0x8147b615ddb7d70a49c391fc9b37ab5c6d61cfc2 0x07236b543e5154e628c3e1aeec4b933be37d0ef9 0x16f1c26e58463e754247bd4aceb0400991435e94 0x79f845c73ba0b9b10eaa26bae993dab9aecac16a 0xaae4a23bff417b0a26e3db280ad890005a4895e5 0xf1e6879661a6e44eeecc6951c795d11abdf6b98f 0x902ca99e3ec7d3be3f4a7043e91d2908fca29de3 0x737f99c1466aa2fdfc6fb7a88cdf136e1b9df246 0x95c09ea6fa69dfea73b2c6b5071b57625072162f 0xc37de3d76b446ca8d52f06cb6c1056454f54b0d3 0x0143ea11436125efb840b8f081e9b82f64989bcd 0x275d575cb2b69c1334799558596d8808fed9048d
