ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-10FFC6AFF9A4
|
Infrastructure Scan
ADDRESS: 0xe2e3f74d2a3f8e13736e941d93bb754e932181c6
DEPLOYED: 2026-05-09 02:30:59
LAST_TX: 2026-05-09 03:06:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
? OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Synchronizing with block height 10170. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Validating EIP-standard compliance (ERC-20/721). [MEM] Virtual memory mapped: 0x0000 -> 0x9c39. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Mocking MSG.SENDER as 0xdaa2204bc48f8a6b9f043d18fbfc7bf3a84a89d2. [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Security status: DEEP_CORE scan finished. $line = str_replace(‘c6ccf532…7a7727c1’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x29bc08b379f441080f1f996020dfed808ec13242 0x8056e2078f02fe8f1e05533b08eee53255c67693 0xbc474df0ea28492304ca9f448afc0add277d878f 0x3dc5a0c949280a4c8d16709f3bc3e760f9271414 0x70c003e09479dcf0a4f6b4dfaaa19611322e37c5 0xf9b4adeb5f57a2ef68a1a60931bc8af00b79d01e 0xa6701fbe7d45fb5ee7b9f91451b8f4fdfb3b64ec 0x7a3357e25a7e1845a33bde30f617874462325a50 0x2c7e644fcca5023a369a3f64239d8f9404398682 0x67628c09db70d053c690552bdb46bc25b041c82c 0x15776336ed750dbdefeb9c832f4afeb465ae4bb1 0x3ce4440fbd6677c958d8748c58707df335330d1a 0xee63910a7444bc2f60d1052d740917587ced6cc5 0x2d64ff8aa10e3cff6f1b1fc900b06a21c0cd4c14 0xff71af68f333ec102286852011b405a69ad8a818 0x456967bf8bc72ee54abb00d4df87f2ef50cac978 0x87ebfc2eb6cc966e7946b7a18a0b6ca5ec7d17bb 0x96cd93779e8bb4708b9ae27537f0bfea92e68dfd 0x76d114f184a31ca08044f2a8d58934e69fd88366 0xf32df5861e98488f317e6e1cd8a6236a04f9b8b7