ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-40725A0FC70E
|
Infrastructure Scan
ADDRESS: 0x606e73c5e1e634bdfb0a3329086248785c3deb80
DEPLOYED: 2026-05-03 01:55:47
LAST_TX: 2026-05-03 02:59:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Pulling contract state from Alchemy RPC… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Identifying function signatures (0xd5eac490). [MEM] Clearing temporary registers for deep-trace… [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Fuzzing input data for 72 iterations. [TRACE] Program Counter (PC) synchronized at 2519. [VALID] Comparing result with Triada-Security-Standard. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x6f2b4a4a33bb21a131fa99e0fb8551c7928d2068 0xba22711a660255b896cdc522f93c936ff0fe24b6 0xcfa99b1d4edfe646c599c620d0a50c5de37305c3 0x5abed571172552a73b964a79e9a7e866a9206e25 0x86ecdbafe0e2c6052beda7fd789c62920a0baafc 0x028f2392316e0785238ac8ceb224626047299e63 0x75f2943cdeceaffe505aae520dd6a454b9e7499c 0x8101e50098c826205140a4471800d353cc30eb27 0x7e0f39a94d1181425813739c3f6215c41ac362f3 0xe300c01a16434ff8d922045d20f56643dfc2d5fb 0xbb74fc1bd36a0ed017223aa4b0057a6a9941eb32 0x0560575aa6b678685bdf4c05c525b7444223a9dc 0x8d9eab21b258f59db911d94d2db6bd297a0fb661 0x8aa818504760bd9abcd241572dde3488de112c80 0xcead295c889e80c30e087f929df99b8aed0b7b06 0x588773d8b0916046106e46c74fee571d90284a2f 0x2010895d4c0cb73e4e320a913c805db27da4a57e 0xcff0f3ea3a7abae2bc535acff2b6c07d9d66b24d 0x79e2ef98d413b5793a332e1c14599ab5dd54df68 0x58eec8f4184876a06db9d4e45c5426f01bf4188c
