ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-7E29EC03FDE2
|
Infrastructure Scan
ADDRESS: 0x171297d0536452e1f08bcc9d3f06b6e43e45cc07
DEPLOYED: 2026-04-28 23:59:47
LAST_TX: 2026-04-30 13:28:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT
EXPOSURE: Standard_Compliance_Gap
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately!
|
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Synchronizing with block height 72146. [FETCH] Entry point found at offset 0xff4c. [SCAN] Identifying function signatures (0x71371bb4). [MEM] Virtual memory mapped: 0x0000 -> 0xde7c. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Verifying ‘require’ statements integrity. [TRACE] Execution path: 55% coverage. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Log signature: 9326e568c68a939acf1110fdbb3785b288d1bf77b768fbe6463734304f5821df.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x37e0ecf59020f05c75bec9af62b5d67289b80e5e 0x1bd873fbec4d94da1509257c7f894e0c315675ac 0x55b5c2d903bb470ed2432fcc03189822a92056df 0xbd7a29cc20576bd8f9aced959efba842b20aca19 0x6761141d3e95c4df0d9edf931536597f4936e6dc 0xea35fe68950a81fb24eb0104778de6c33ad58c08 0xdd7829ff40c0d9ec002d31ab8dd930e9dbcc87be 0xf5e5cbc6d84e591e09432a1a86face94c3e12969 0x130e5e2204d98305ba28f13868701eb150026bda 0xccc00aa8d8272a8f8a15eca61060975d6da27d17 0x28ef795f39a79524fb9e2255c1eb9b4d7d3484ed 0x4a4d772b74c97482cc8b9af46f1f86098aa9a500 0x345496934c527595ce97b3d264c6e0ea7dd460ee 0xc301b1633e1736396649bb386309682b9271bdc7 0xf5465dadeec29e6814df36c5df53cb5c1c66648e 0x9f66c305ed3cd3b1a98e5308574ef927bb08fd67 0xd4c65c844d17ed43ceaac9a1936527aa43d64852 0x25abc73f61b4b4d65bb8907eeed07e254088af03 0xd47b064497263dd1e52042746fb2012510315bab 0xd7ad3257834bb8149ed4f52c876eb54bad9bd0f9