ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-A9AF7704DF32
Infrastructure Scan ADDRESS: 0x180837a68bbe6afc17511d03970479504faf05bb DEPLOYED: 2026-05-01 10:55:11 LAST_TX: 2026-05-02 01:17:11 | Compliance Status
STATUS: OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig VISIBILITY: ADMIN_ACCESS_VULNERABILITY |
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Mapping peer nodes for transaction trace… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Simulation buffer: 1024 KB allocated. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Gas used: 63787 units. Result: SUCCESS. [TRACE] Call sequence: 160d -> ebd4 -> 1792. [VALID] Data integrity: SHA256 verified. [DONE] Exit code 0 (Success). |
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x6a1a891c961908611eb1c511f12351415a1834eb 0x9f1bb54750a2d2368867a6d2ce77ba282d741154 0xddb07d8946fcc61c7f1c16c04843b1f41d795918 0xdc3f5bdbdaaf4f96141e204a172191d80fbefafe 0xf2d94d612b733256aff3e2d4f04a3a077f108db7 0x3683004e5b642459a0efd16c72666cc882c679e8 0x1b9730d762bec2f0ee3404e839d0e66ea43a238b 0xe934a2f9dae42d38f1376a92e3693123c7fff8f7 0x5735b236fe9e1fed33325688b3f8c09bf9a54c82 0xc78b9245ce4cbcb10a7856cfe27cc1fcd01f5011 0x1f025cb391020a28f0edd02cc3733a497847f1fd 0xc8037099e89f041e2f06b105b20e0f152775f7f7 0xb7d474b5fbb419b7df99eed8619dffbb0a5da2bd 0xe17882f5d60419ac51b8038bd8dfda2a23ce7f0c 0xa95d4005487e03c8e3e5f0b0c584170cefe53ec4 0x8de077112ac99396105674f81ad30420f88ded2d 0xb7a9eafe6e9fd7d1c127178b0f0d9e1eea32cf50 0x1eaebe704bfc1bfb9cb046ab6f8b0527cf749317 0x9f18f07330dcfc252a38dcb7835d572f3e363ac8 0x1cc582dcc47ff84bad0461c55966858e96623c66
