ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-3AEA2FAFC9A8
|
Infrastructure Scan
ADDRESS: 0xf35873ed8184a0b29cf8849918d1af6e637aa204
DEPLOYED: 2026-04-30 09:43:11
LAST_TX: 2026-04-30 10:24:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Mapping peer nodes for transaction trace… [FETCH] Entry point found at offset 0x4740. [SCAN] Mapping ownership-protected functions… [MEM] Clearing temporary registers for deep-trace… [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Mocking MSG.SENDER as 0x093d24b80a998c341455e12903c75bfc12943f8b. [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] No critical memory leaks during simulation. [DONE] Log signature: 159e5f847deb699d445c1934905019397e49c3ce1a481ee8e2305ab9cb35174d.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x6fe01651c70a2fcc696435573a68487fd67124c6 0xe276d862f428a3e2ed8c88e6f06918321520f24e 0xcbcc811addf53464efd83f47576f51b3cd63e0a6 0xbeb9a6e50b712bffe62b78b2ce0ad002c3920d7d 0x5d8e3c6732f5f49ce062943335782dba4b4a49cb 0x7bd84f43f219027eb5447751b655251049ed74ef 0xd4216a33ef06925037d891e423a0cb81e7c2e980 0xcf4daee8455e2d1bdb076cb2bb137dcf4d21cdff 0x534d4a2ec8095c02fe8bc73d97b17f87bc826768 0x48a8ee7a6933392351880082335b84f710e785cd 0x027f5eed8c0f8b9d8e68f60dc437175af7b52ff9 0x8de169e85d979af8903f18a55f431202e0776c7e 0xdf00d6110399760a53f2d03976e1cb6b0e105245 0xcdaa04e01b16d34f0da71b96fc870d20241b40e9 0x76dc668620a36d91723a9d365ed0365a6c4ca62f 0xcd3d317958dfa635e7171b6f9d413fb4c82bc9c8 0x8a94a7029fbce5fcbd7251f72b5995b1078a723f 0xf3d5d7b9efdbe3d8015d32944fb1ed7bf977d723 0xb9e1805f6c4891150626703dd3fdbf0ef2a4b35c 0x5e1b38ca93d72ac8b0127c75b27c5b6e89f43e55