ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-7053473A587E
|
Infrastructure Scan
ADDRESS: 0x6fc1cce206d3bde2ef5897a15743c868fca78c5b
DEPLOYED: 2026-05-14 21:55:47
LAST_TX: 2026-05-14 22:55:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Fetching raw bytecode for 0x6fc1cce206d3bde2ef5897a15743c868fca78c5b… [FETCH] Hex dump completed. Entropy: 8.45 bit/byte. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Tracking pointer 0x8a0338b8 in memory heap. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Verifying ‘require’ statements integrity. [TRACE] Execution path: 52% coverage. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x93b6586070324fc7df130e29c90d21a2481c9e40 0x773663348b1a5b77de2bbe42c881fe0faeb42c14 0x9c78355518823d2800f9512a6780610f8853ea55 0xf4ab1da058362b2968adb4d4db2447b11d396e36 0xff3668671492d580d65ac440d53ad4132efffb0a 0x9a996216c0cd3b1cdedc4d2a38e0ca94ebec3565 0x409ec5adca4b9f9e1b03e83519e834f939858b28 0x325829d625e8504e6ac581daeabefaf6e2a65892 0x8416d5dc307407d52856a6748538127e4aa7c92b 0xe0699526c1b67180bd61c44899f54619264ea0e9 0xbbb4aec0f6f75418f967c6791befb7d8eaa4d9a1 0xab4fd44eb33ddf35e9e5e40fb6e77b1203e6953d 0x005da6de3a47330167c948430b5112de76d0ffee 0x8e51bf58c0b5f40d55641b2dbeb4c05128a777bc 0x81b579bc3107a1895ef0c75996f1995252961426 0x123a190aeeb5c8e2d20c0ef0519cb0a527b4feae 0xe59212bb72b545498672a51d763ae27d7ff80029 0x7df3aac3d0b19ca2a674a02fe8718c2f7fe3dcd9 0x5f0e33819f6e448929559921bd1dff078f831b17 0x95d67e0ab794247049c90892862c179a02ba286d
