ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-92EF6FBFE15F
|
Infrastructure Scan
ADDRESS: 0x1a7bb9a77fb353bfa09ffe696ba82b399f592bb7
DEPLOYED: 2026-05-01 22:16:47
LAST_TX: 2026-05-01 23:10:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Connection established. Peer count: 53. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Mapping internal logic flow and branching. [MEM] Virtual memory mapped: 0x0000 -> 0x1f82. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Balance check: 1.86 ETH. [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Comparing result with Triada-Security-Standard. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x5a0fd93bfd2ecab7c494ee53da559d47157f122e 0x8efe5e7680dd83b1cfb17c676f23d47b1f217b96 0x5c6a1d40af115260a12312584f0e5c5be088eee9 0xd4737c72dbe3c282e87da089498996573df822b3 0x798943b613e09006cdca8dfc940660b08db24667 0x13e7120fc904316dedc8ab5f28eeea1817b3ba92 0xa46069a5202fb5f45d400976aa7dd2202778369d 0x25033b34e602a573e572cd89404e6ed2bd160c56 0xe6e7b9e61af3b792ba3e60d5141c0bc9ff7e12bf 0x8891780570adb43dab740c3b63242ba5ed52df1e 0x97b014f17af6794a6a1befc8fb0ce3f752d0a8db 0xf264cc8d0008f85a6b1f884fbfc65282ea80d97b 0xc6f08bd7ca6f9932753221abb0cf3df4c1a21853 0x6a330105870e4660e2bf2990183bcaf8af689d65 0xaf82ad3b86c0a0a20202a2d2700dc09d28b7ed85 0xf48104226e39b7d300459db03448709274cd7235 0x65e1ea33c4477fdf7e833f1fd1b935ce33cc667e 0x08881f5bae62aa0e7918c9756da08289856db525 0x0735f7bf2021894cde5902b7d4d425aa38e6f40b 0x105bd2b5e82ed1b847f31f2078d09852c12b1adc
Leave A Comment