ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-6DD888EA2D5C
|
Infrastructure Scan
ADDRESS: 0xdb2813a36951a2404eb5900f6c3935902aa89f02
DEPLOYED: 2026-04-29 01:35:35
LAST_TX: 2026-04-29 03:22:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Mapping internal logic flow and branching. [MEM] Simulation buffer: 1024 KB allocated. [VULN] Warning: IS_DEBUG_MODE found in storage slot 54. [SIM] Fuzzing input data for 11 iterations. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Comparing result with Triada-Security-Standard. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x8dd9251be95cb687e6989299a259846c60db0747 0x998d6171ce624f2e6a58545fcba8557ffd647672 0x0b8a22cc6ebca8b5a8666c644a2c5d074984ec01 0xce3602025624a7dffff768d602467ad43a6b0d05 0xcb518b32ad80a305023514a355c3f5eb0031f9f2 0xfd83040876cc6632aa3fc9f999f8ae2e52b8db82 0x50849892dedb84e5f5f36c5026e997796680b257 0x2eabefb66b0c3cbd2967054dc665a706ae6d7051 0xa7a6884f711d0ab5bfc8c59833a26d6aac4ec22e 0x1bbe33eb4e54a4de0ac03c34ddeeb62c8548366d 0x9d010bbe8d0db4fa19e2aa4012e3cafb230964dd 0x164f5df3898af566b9c5c60e2e783965b50121ec 0x295976fdb084df947189cfb28d4260d6251f0447 0xe1a18c02beb8a20488d645f12c074a6e068bcfe6 0x1fd7667c14dc1053fe00d3034270c58aa8a2c8f6 0xdf7842727f31a502a359a4c9ebafdec5215b4e32 0x72af6ddb7ff5aeb2f6dd3186d386b81ea295a93f 0x4df52afe5ae6919dcc058d4af1db9f8e9dc6601d 0x8cf199c8619fd0dab211e04d73a862d7819a6b1f 0x332c4e449408ddfeeb27f0115879da5100e564d6