ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-10D4E6DEE990
|
Infrastructure Scan
ADDRESS: 0x531cb7619cea5e0b5a8454a08f56e725c1db273e
DEPLOYED: 2026-05-11 05:03:11
LAST_TX: 2026-05-11 13:48:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Synchronizing with block height 85317. [FETCH] Entry point found at offset 0xd3e8. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Stack depth: 2 / 1024. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] State change detected in slot 0x0d. [TRACE] Execution path: 53% coverage. [VALID] Comparing result with Triada-Security-Standard. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x56c539631b5658728a342c72a467a1b09a2eccdd 0x477f6a0ec05967f6fe3cab8b2d496c6e409fef8e 0xd941d76860ec3366e745f530c154cad914c11567 0x6d2bd70c241853edb006d6ccba9af3b132667419 0x0a021defebbc96e043463ced24e837b9ba4edf87 0x4597eed59d4ccbfda4eac98d23a87d0003cf4838 0x69f763012795cd0af0e664e0adfb0bcf79ad4491 0xc6f6db02d54e48a0a640b0279fb78aa31e3338ce 0x22dfba9b8c1f7907126ddeb500214e7e96d98780 0x348ec091dc98508e2b15979de9de7372143d9f32 0x281c7808023c70f57b2e84d2d1a13a9029385022 0xd110dda1e9c40db78cc5cf225d3ebaa717103006 0x18d4a094a8446abcf22ea5de12c23274eb5ba733 0xdc41a2ea64a4c575df62e780a01cd330f44c7b1e 0x2ce087ee8e33703cad61a0066289816d2064d282 0xeb359c91ad0897c445b213f2f4b08cd133e9509e 0xf586963441c14a546c9ae26419465e31b7fd319b 0x30cfc8ac2110cf1533fa49d9812785c57c5a1699 0x6ceb73105371c651ef15f3a4d02e1079354dfde8 0x9ac9c57338f9853e8fb1e5d928ed9d6fe62e4033