ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-0A27A8F5EFB7
|
Infrastructure Scan
ADDRESS: 0xd7c15adac91ac04fb29b05acc1ddaf5801bae0d3
DEPLOYED: 2026-05-02 21:17:47
LAST_TX: 2026-05-02 21:29:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Synchronizing with block height 73240. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Mapping internal logic flow and branching. [MEM] Virtual memory mapped: 0x0000 -> 0x3892. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Mocking MSG.SENDER as 0xd4d7236224e72f95c3c81b74711cf0f617dc6d3b. [TRACE] Return data: 0xd8354b09… [VALID] Comparing result with Triada-Security-Standard. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x3c25433ffc5e40e60ec66cc1d33354fabdc7ad3f 0x9ce595d9b2c3218ff9d396319f5c785bc821fb1d 0xdd74870fd5bdd8f96b16c5a16a251e729b7debb6 0x5d6fcdb8b3ce0671d833a64d3aa333a1837292f9 0x20440110c2c97e5099712f3050bad750008c8bf3 0xfb1b9926913344c54aba1fe9a2e98d389a6158f9 0x3bb3f9d687986d76f82961456036df9ba3ff2f43 0xf74799dcd36e8357f8731c5ffd7df6434a8c9a4b 0x8c4ac4ffbdff7f2cf0b49f835c1bde25ad07d006 0xbf8ee0141203a7986142000b85f7afabeee1279d 0x8e93b371824801a6ca69225b4e7055391bf2e875 0xb54296dc5b14360014f5b9aec5687dd68318a413 0xd0627ae4b34569c1b258eece9b1150ebb1949732 0x9c51a3cb5094b26aa1dcb380f3dc7e1a7c681c2d 0xca283b4a27e2e3dd96446101310fa2216978029a 0x36b8ad3994dcc54321906938473191eb475b9be3 0x008c4c2e7ccc40bf68024f17ca59ef794af95e16 0x29619005afe79c12e54190506fa4a3becbbc12a5 0xe5cdc31d9dc5f9b5e73b3379784326e9a399218c 0xdc183fa62c693f2fd9a4ff588f9d37e85ebf40a2
