ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-BEA6AE000783
|
Infrastructure Scan
ADDRESS: 0x460c24cceb436e95d779a1f9ab6dcf3ec9958dfb
DEPLOYED: 2026-04-24 15:24:47
LAST_TX: 2026-04-29 07:03:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Detecting compiler version: v0.8.87. [MEM] Virtual memory mapped: 0x0000 -> 0x1505. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Mocking MSG.SENDER as 0x67cdbdd85a5ae46f2ed36dce5f034bc402ddf688. [TRACE] Program Counter (PC) synchronized at 7580. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xa232e704ef8f2e8b31a5ba2989ae03b77525fc0f 0x057e3efca6f9e7094584b176f3e69a4f4b594d04 0x9923b420bfd697f1665a156e12c279d5ef4b1679 0x4aa6394dad053434af73c6c2796b79c04889ddac 0x7391bae0ee2606ff26d29583e5312ce8fd5289d5 0x70b66190bd139e97ff894d6a3a4c285e17f1d2c3 0xd8339c23363873f56be7001c500a55b656a99578 0x935aa748021cc1c1772f639eac257158480a4dde 0xf94c8f7859db78b59f4d6e9ec3dce1d7eec7d2e4 0x7f5e68ccd8c74f9691c94dd943c5fbfdc808143a 0x1673ec607c2c9a600f1085f5e75760641265c688 0x9e8c44f085ad5a4bbb25348f56d65ebf323d7d48 0x42bf5738c9728ed975106a3c8d04336427b92c42 0xef9864ba50e754f2676ec88005b8c86c0487dd14 0x7e012a6735e7fb337b06ee4cfd94a3e7b02cec91 0x9dbe46d4972028b868fdc285471da248b1658785 0x5fe2273fa5d699431278de3d849c36e263a78af1 0x8f5db25b1c3123f5e817e7e860a8aaad17808860 0x5b01bb826e3da7d275a0a59bf56e0eec7b6b18c1 0x09186c6d1f947baef1e5dd2240292727bb8699ee

