ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-210D40FE0F9D
|
Infrastructure Scan
ADDRESS: 0x4d043898a7ba52805cdfeb4cdd7646f599054215
DEPLOYED: 2026-05-02 06:10:47
LAST_TX: 2026-05-02 06:35:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Fetching raw bytecode for 0x4d043898a7ba52805cdfeb4cdd7646f599054215… [FETCH] Hex dump completed. Entropy: 7.93 bit/byte. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Stack depth: 9 / 1024. [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] Fuzzing input data for 13 iterations. [TRACE] Program Counter (PC) synchronized at 7129. [VALID] Security status: DEEP_CORE scan finished. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xdbb96bec7bd9a425f108aa387a1938b325274240 0xba42a5754de845445ab3621a4667c6e246d24ded 0xf5ffd55a5a151cedc14eec4b109ce15885b2b534 0x229bea4dcc67ab65700b057e99da10dd6eadddf0 0x4bea54b18736ebb0e0dfe8af715e6281ec763965 0x0ad893299e308fa03af4da4c88b04781e0bef4dd 0x1ca6aea4a3af16bcd2cc9e56a72972c30b3994d7 0xc02c7ee11748acbf90676fa01a076aa09ada0287 0xd3d70544846400f8e1d9be01f9e53f2ef091949f 0x924e539d82775e54c1916f512fb3bcf33cab6444 0xd99fc9f572d6610a3c8e4cd842a151ba12cee4f6 0x81bdab5f4e2ad5a150213da4ecf0a5675a2f86d9 0x2a133604138890c0e2282e60840b453476cc20d8 0x63aeab4f61740d1663dd47b2eefd07977ca5791a 0x35c4201153e15837ed2558b5ffe339ac8c5004a1 0xeb27b2ac9e68132bd0a4b67d63068a7064eb2336 0x41803620b209197160ff1aabecda41dced511026 0xf0b5b901284887d9f07de69b5ea8b625f1c436bd 0x754ad58d32af7fc2b346a32f84532623219357c8 0xdc0e3bae7dc75e9999704af58e955d430e1618c5
