ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-C1387384C19C
|
Infrastructure Scan
ADDRESS: 0x18e37773e3ff058514037afdb778f2d85b54c1c1
DEPLOYED: 2026-05-03 12:55:47
LAST_TX: 2026-05-03 13:15:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] System integrity check: 100% OK. Initializing scan. [NET] Connection established. Peer count: 41. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Tracking pointer 0x78b285ea in memory heap. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Fuzzing input data for 42 iterations. [TRACE] Return data: 0x151d9281… [VALID] Generating cryptographic proof of scan… [DONE] Report exported to IPFS: 4c0c4722…e0b926ac.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x176e51e43ea8de59eed6d6d578e959eac7b79a60 0x7511a8580c4c2008c801207ebd19b52847b1815b 0x69ea876e878f4705fd01c268a528d7630ea2c091 0xcff4d28e6c761ee486ae20fd2622c40e8b6024af 0x0f0bea3a2f6afcd4e7ec146e71c25167318d52f7 0xee9789efed40a24fc518b5899703c0e032419e81 0x72599a6106f86496a4650c622c689cebb6251b08 0xfd103578524820cb9e3504075e6cd87cc59d0379 0xfb86702838646880d01e6f9f3627ccd2ddc9af50 0x644ba8db7f7f682cb5527e54791cc1ae9ef1afc2 0xafa37bbf68d33bcb35a55ea01e299e2d2de0f8ee 0x5bd3e19001b8415fa0d79e6d995ffb6f152c751c 0x1cc79f8cd395068229f676c0e2b8dd51be4147b9 0x1cf7bc76ac3492eaa180eaeaef89d88a51174c97 0x80e01cc9a202658674e31e1d57767abd12d27316 0xd092d8143607d703282d0b7e3b49cdf61805da4c 0x854bc9a5445495396de4cc228a5f945c680c2d4a 0xd915b5d8839eb02ccc50b59f7feb732e7201ac83 0x84bd11796ccf738490ce57ea5cf3ec6a29c8959d 0x4b7c74427c8e63de8d54b09039b9fc9c4c14df75












