ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-0B82A321606C
|
Infrastructure Scan
ADDRESS: 0x328e8fa1cf1ef420bec48cf64c0818ece5c569fc
DEPLOYED: 2026-05-16 22:29:59
LAST_TX: 2026-05-16 22:57:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Mapping peer nodes for transaction trace… [FETCH] Bytecode size: 4267 bytes. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Stack depth: 3 / 1024. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Fuzzing input data for 94 iterations. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Comparing result with Triada-Security-Standard. [DONE] Disconnecting from Ethereum node…
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x31f8b10043037a4493ee0b694fb508812203e51c 0xa0b4e6e5f2fc9c63cc90baa1b2f33f71a23d4945 0xe90c76821e7c9708180cbe3aabc8e5cd63b1eb73 0xc74089dd1175a15ced78c9a13d986b8c326ace24 0x811d6d6f6371c199084010586193f9cb88a80872 0x3a17ecf37a6a5b7cd61eac3b2830002eccaa2291 0x4d486b08198945e094f4093cefbbe5210232a813 0x63a3f092f6062d7490c6c02c959e7724516e8e98 0xf7fdaf1865e8099f5029c53b81b8266802de4fad 0x555e95c3fd287dc9f0bb76626e55a09f40b1457a 0x4084b2a3efd3ea1fe297dfd1ad97996525c557ed 0x24324df55f207fbf5ac20b90c338b5395eec29a4 0xaca409a06ea0fe1ad00a2c31780b83aae378af27 0xc5592fb52e1cc87c8125aa413a5e6c32c42f75e2 0xbc54f66c194bbd702f1e529954f792813a5e4d47 0xca8ecc2b64464109672229885ec5ad2ee7c5bcbf 0x5585e72fc4c216da8d59abb8fb64dfb7bbd75fe6 0x1f683c4e845139a8cfc4f471922be47af2ec799f 0x9988236fadec4fdb50abdf41479871c2e54839b8 0x3dd672f323d2c4f698dc40fb0e8c89f34d46d6b6








