ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-0E41A3E3743C
|
Infrastructure Scan
ADDRESS: 0x9f113632d69bf5fdd34c81a5daf3933bfcd11d1a
DEPLOYED: 2026-04-27 21:18:23
LAST_TX: 2026-04-30 07:35:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Reconstructing ABI from function selectors… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Virtual memory mapped: 0x0000 -> 0x9b98. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Fuzzing input data for 56 iterations. [TRACE] Program Counter (PC) synchronized at 6390. [VALID] Data integrity: SHA256 verified. [DONE] Triada-Engine standby mode. Load: 3%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x177f609b50ad9c5e6b789f9f51cbd034ed6a5db7 0x9ff56b486ceceacb3b7ff8e538bee4ce0992f7b3 0x79c4c1f855ffeb8f96cd55a54bc7bdc3602d20e7 0x14eab8e496a92c3f091629fbd7a58c9cc0a47265 0xe300c01a16434ff8d922045d20f56643dfc2d5fb 0xc60680170385387b33b46c84c6de78fd9db164ee 0x55f57cac36e53f779ae7d75b09c7b41237ee4a3b 0xb005b90b2f613068f69c3bda47e548941113ff08 0x2fc59a4be1c25733a37a5c975fe7981872b6c079 0xaf82ad3b86c0a0a20202a2d2700dc09d28b7ed85 0xd8d7177cd539e79b03fa25f888eb6612aac3f675 0x86a3493063d5c35ffa1dc0c6fba1fa59b7ddc748 0x3e28fafbb6a51446dbfc72aa422105cb343a1b3a 0x2e192c5e7c108e5e63a67ff6f0e09873a11c825c 0x2b33f486736acd9817d30d08cab7c1e7558cc46c 0xbb3a5c8ee6d244f56ed773d8145aa4790bb45f96 0x0833511354779d8b6119ca9870936fe8825a2976 0x066020fc68ecc2fb225eaf1af765127fdf60a496 0xe37d8d409b0dec2650bba5799fabeb5b0fef05e5 0xed9bd4fa0169db811d1a764c6d7ad1d8662d108e
