ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-F0DA06D3A172
|
Infrastructure Scan
ADDRESS: 0x1d31c18bf24270db4c955e9b722935ed249050a0
DEPLOYED: 2026-05-06 10:33:23
LAST_TX: 2026-05-06 10:51:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Mapping peer nodes for transaction trace… [FETCH] Successfully retrieved runtime code from blockchain. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Tracking pointer 0xba3d1d1f in memory heap. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Simulation completed. No state corruption detected. [TRACE] Call sequence: 4a2f -> 826f -> 36c8. [VALID] Security status: DEEP_CORE scan finished. [DONE] Scan task 6D2EDE9A finished in 33s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x919d1405ee580042dbb20d0542b7f5f3b04ddb9e 0xa8e5e8b0672bdc9168dd7b845c3ad59e3c97442c 0x09f4bfdbd9149f4782d61df7de645b8c245e5df4 0xf9e826077dd39d6ae92eab18653239898ecf8afb 0xfdec03975e4e05c3819d0643b577a6f4b462d7d9 0xb3157599b9282d3bcf44489fe080fef8c33fb200 0x6be9a507fb12e1843e6066ebf5ec7efff4f414b3 0x026e6068a4ece14e3df802f57bbb9af4e192eaf0 0x34861aab1cf2abc0a9615061332bd9426a7c7bb4 0xeb98f2d0c40d259df61fb1a8bb16adcb52a8fbb0 0x72977f1c3d9ced5e34dba67b34b2e4c6d37910a2 0x803e95be49d5ed0f7a9673451a48a962e513b793 0x5dc9ce85f5c43faae65d407c34078e9885048915 0x8e68dfeadaf2877804f8930c21dc5f64dcb88c12 0x2f3bde453b6779d13843c95b8f6a322181761819 0x4a8d41b576e5f04bf64c3a667f173b40474ddbbc 0x1d2af7b113c79af5e0f2ff9c7cfe25f42bb8657a 0x68c70b39646e86d694d732df370c7313b774d35a 0xd6af7d3aab5fa93ecd9d1d6ac024d5f3588377a3 0xd4377729c8405aeaf82eea0cbbcc85afe60680e2