ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-5105E14608FF
|
Infrastructure Scan
ADDRESS: 0x2b17de3a8f26f6a80b3b82617a81da92aea2c6ef
DEPLOYED: 2026-04-25 10:22:35
LAST_TX: 2026-05-01 02:33:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Successfully retrieved runtime code from blockchain. [SCAN] Identifying function signatures (0x0ab86f44). [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Mocking MSG.SENDER as 0x0651c510246153fb5f361fb963e1dfad7d2f7005. [TRACE] Program Counter (PC) synchronized at 2277. [VALID] Security status: DEEP_CORE scan finished. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x5ef9f354f23ffd434d2764f2332b874c8e7c3b61 0x3abb55ff347f14b8ab141006ca839847787313b7 0x7bf4baf2079f3a64acf4d50aaf322431c27489be 0x831d6436b4780fd4cb16f58cde4a50b75c9e6846 0x2681d0052c5cd42bd7b87b587e8d99de010a6c25 0x8416f20e5da8b3da78d2c73eb55049ed59bf2f70 0xea71b276d931db8c96bc79a4253c8c86f518ab23 0x79993ccdd689e8388bd0e2a22d486f417c4ebbfc 0xe8ae82c21a762baff24690d5699c1da43e62f9c0 0x6edd94c25d5e3483ad077a25b712f1042bcd8ab2 0x16a99fde53cf1eb1a075994e28daff455a2d9260 0x4c8911e473106d22287029b295f721581b160bbd 0xbc48f180f2267d744e17b885e666feba9df40071 0xd1eead55ccf13e143abca8a2a8709cae516ef6ae 0x630f29d4c02bb411a9429aaf914cc03fd71f51b3 0x2476b8be2ff1014792a382194ed68ddd6681e9a1 0xaf7521f5db54508c3f27d1ae48a16991feac8e52 0xaab71549cc7b93c80cd38b773c928a49b6344957 0x043f23e57c69abf19c13e16c24f3dfed4a68ec0e 0xe67f176f861f90e2153118f9c735c53546d161b4