ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-92834CC31367
|
Infrastructure Scan
ADDRESS: 0x12a77658112cf42914cb614d13653ed5852da1e5
DEPLOYED: 2026-05-12 07:57:35
LAST_TX: 2026-05-12 08:21:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Handshake with node 0xed4d57bb successful. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Mapping internal logic flow and branching. [MEM] Garbage collector: 0.64ms since last run. [VULN] Warning: IS_DEBUG_MODE found in storage slot 12. [SIM] Mocking MSG.SENDER as 0x73acbbbcc6f5ec6afc580c87c03b47d436de2d54. [TRACE] Stack trace saved to /logs/TRD-888B47FA.log. [VALID] Data integrity: SHA256 verified. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x0967d6bda77a9f1192fe14138859606f9e62d198 0x3204b91ab4181fea163c2be7536caefb87d1954c 0x23b23538732746089bf5f679b5fef44dcc4b1fbc 0xe81963c2b890094ce25a8bf502c64032a4c8ffcf 0x90eab2428bed5bea1db89f9cff4c100cdffb37a9 0xbf244b361d92fe5000f117e1aa5d7de98cb49231 0xe080d18de69fa521a6d2a40b843cf83c012c4398 0xc49cec957f6c8363dd47233048547ca3867df789 0x38b4ac5bfe87bbd42e14ca03e28b17f9d3485169 0x2aba1051a87d0e74484490405b9cb0e8272536e9 0xac05e86470a80c7cb638d23dfe7f74f36451c4c4 0x8f2fda526e128863bbedaa66008d2162456c0891 0x2170d6bc79122ea5a347b8dacb2d8a454a630917 0x544dd8d14c4b693fb5240522a4c782c2da645426 0x7ffb1b3eeeb45eccca970978e0f40e0714176b68 0xdbb77651df8a633a4e9d8c858e46878845878b20 0x73bf888d6418248c262b7de26e211ed613b162d3 0x273ff7d8d3b1ef342a6bb805501af8e41845e62a 0xd35eb06a3f7b78ee74762ce3c8e7004f8651efcc 0xadb40bc023bcbeb1c3b968fb4cd9a6b3776d7e18