ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-AC2B941FB32E
|
Infrastructure Scan
ADDRESS: 0x0b7614b72ce6400c76d38104d4b70c0bc1a04c7e
DEPLOYED: 2026-05-08 20:10:23
LAST_TX: 2026-05-08 20:21:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Mapping peer nodes for transaction trace… [FETCH] Entry point found at offset 0x3633. [SCAN] Running static analysis on JUMP instructions… [MEM] Virtual memory mapped: 0x0000 -> 0x0f11. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Testing edge case: Zero-address transfer… [TRACE] Program Counter (PC) synchronized at 9794. [VALID] No critical memory leaks during simulation. [DONE] Report exported to IPFS: 9fe9b358…f586e849.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x367b3883ab5721b196bbf5c2127ab32fd8679fa0 0xec69efca0d59567752af48edf73b05cfbec94415 0x923b247a59cd3f75328b7045990c0e13c8f488f7 0x882d268831bb47898d15f84a493b9537d279fe2e 0x4e98a1a038831b7d756ea9214508c4b34f4e4d3a 0xd3da539350fa313c8cab9a8542baa2f8c08a14a5 0x010d7a1bd87b9a96e307e0dbde006630ce706fb1 0x79f145ec07b209e782013ea5932c553b5f56ec3f 0xf848cce6347718ef9d469d9ada6d9b260799b783 0xad42d4e261b97b000918645c1aaf4ddba902c549 0xf080d741d069b107d728b68f781843d83a0ea8fb 0x94764fd7a025a34f9c147dfe813a1d7581f1cbeb 0x9c24b33e80105cdabf4072587fb6484d4c085070 0x970ebaed20c648b1e60fe89b461e5c91c2230bdf 0x5f03da1e35741c7a706f1325e8a5c1c1f96fdd18 0x52599e78b2cf4d3df005e3c76b00e885a9f85d96 0xefd4d4d17f1fa6cf97131a12f66bde63f1c75909 0x8c7e8355e7496278b0c30b3284431b23ff57ff61 0x0ffb06bd07dd02de77d06a367a46eb7c9b6ee2f7 0x7da8a87056c21d8fe2465c430a6769959dd155a3