ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-981F0D26916B
|
Infrastructure Scan
ADDRESS: 0x9e68096675578cccf6eb7ad01350f731dde633ed
DEPLOYED: 2026-05-09 14:41:11
LAST_TX: 2026-05-09 15:09:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Fetching raw bytecode for 0x9e68096675578cccf6eb7ad01350f731dde633ed… [FETCH] Reconstructing ABI from function selectors… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Stack depth: 1 / 1024. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Verifying ‘require’ statements integrity. [TRACE] Bytecode segment 0x1a analysed. [VALID] Comparing result with Triada-Security-Standard. [DONE] Report exported to IPFS: 299332db…6599138c.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xab1390f87b24d4189e2409d98c2b4d072d7c4179 0x2a4bce50c1c80784e0f224fc0ca8dca07885e356 0xdf513c19dd0837eb18cf4aa0d4dc9819f4f45ca0 0xb24090d81c287695d93f46f56815a22d5d26051b 0x306c47a1719898f7070a54b65e73bb8d138674de 0xf88af992c04c082816a534f3b5064728e67913d0 0x5a902fe7d3ea08ae64b51f168499d20b093fca9b 0xa8216b6976a19698913b6ef49c49267997e22751 0xdb11fed6a55a42215879f83f51cc5c5db13e6ca2 0xb3f98abc17edadc729c072ea823a3f058ae17d80 0x514e68ece21f7d3c8ef8752d42bd0b00fa395a62 0x9482c48c70c170b2815d571c16c9886c07c8515d 0x4564035522c0c8d27c714e965d2a497b12f47181 0xc398f794a4e9b59a1d4b4c2688c7a550e71e03b8 0x01d44b8d9cfde00c58e273387a35b53ad1e528aa 0xe7042e4e0b34d9c885fac64688d259fb4ba2645d 0xfe14e17deac02f5e0072ef48d6fe548aac55c03c 0xe5af73890c62e4908fbe698a470c0a2acb500600 0xa5a61c293dbad22af622079d51e57a12e36e4d8c 0x4d91c1f83f853e3645910d99ce429df0f2b82bc7