ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-A8DEBE08C3A0
|
Infrastructure Scan
ADDRESS: 0xc474cf8351aaefed5d2b1184d304010461f51046
DEPLOYED: 2026-04-21 17:14:23
LAST_TX: 2026-04-22 02:45:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Fetching raw bytecode for 0xc474cf8351aaefed5d2b1184d304010461f51046… [FETCH] Successfully retrieved runtime code from blockchain. [SCAN] Identifying function signatures (0xc73119ec). [MEM] Tracking pointer 0x8b1b66d5 in memory heap. [VULN] Warning: IS_DEBUG_MODE found in storage slot 19. [SIM] Mocking MSG.SENDER as 0x192fdc4b7abea7575601e6136f8dca6e2b7bd8d9. [TRACE] Bytecode segment 0x3e analysed. [VALID] No critical memory leaks during simulation. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xb6f41bf954af3c77986abf3bfbf50758342444fa 0x4ef08096b2f4dfe6e89564670e90a95ec6f1845e 0x994dda47d0655cb7ce7b972a7fcfcdcf7f1a9317 0x1fd9e9b23d64a91310f9fc81acf3854e34580e8e 0x51fc3004c7912ce99d24e2f395207e468ba0bbf5 0x00deaa0cd5279dc8913fa57f355e12309b75d958 0xb314000941309deb55e3acd278ec66a565ffcb9f 0x4915721ee9d674a29f617bde71a297e00211fbce 0x835e2663f2e04a0485ca1ca8f2c9c945a583cbe7 0xea8d83e7aefd46110ccabc3c09fc24b459bf6233 0x6d7b8e09b1d9bfd17e0451532da1446db87d7aa0 0x62a69f57443b09b8fb7d22657e7081d93d814295 0x1470642e3da090de2ee05a9c380144b74fc2bcb0 0xb7d62d725aa1d4b291aa350dc4c852f0ffdc127e 0x02347ecf2414e717839bc89b9b9056664e9b918e 0x905f388302f1fbc1dfbb8a6c648f381ca10a0e4e 0x21b1c9933d28b5ddaa672894863a037c9ce02862 0x4dc61ed339ef77159364301df17af3ad5b371f2b 0x59d1d1dd5430d380180559c049dc22ce39fb4347 0x89b0525335ff7b54e7286cf98d9b95d57f0aad47
796da11b4014dd2f9b49aac57e178322
