ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-A88A98F368A8
|
Infrastructure Scan
ADDRESS: 0x5b7c1c4b31e68ee95f6137ed8ee15ca62e6880d2
DEPLOYED: 2026-05-10 05:35:11
LAST_TX: 2026-05-10 06:10:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Fetching raw bytecode for 0x5b7c1c4b31e68ee95f6137ed8ee15ca62e6880d2… [FETCH] Hex dump completed. Entropy: 2.85 bit/byte. [SCAN] Analyzing visibility: 1 public, 8 private methods. [MEM] Virtual memory mapped: 0x0000 -> 0x55f4. [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] State change detected in slot 0x6c. [TRACE] Call sequence: 5fa2 -> 28f6 -> 0005. [VALID] Finalizing audit report for 0x5b7c1c4b31e68ee95f6137ed8ee15ca62e6880d2. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xc90be997d2384d281d7f63bda3a92b2a1eee6bcb 0xc264005ec6c3c74ae2dfd0c60fb1ef5e792b45ee 0x55202083082a9b60031b5039caacfd76b1392be0 0x7c15e70d2a27d2de09f836aeb4161608ef8e5a7e 0x085826e41dc91587271c8d8fc6c0a7b3a7d4ff47 0x081b9ccb30d970a0efbc33f6f21f01bdbad1fdfd 0xba6a845dcb519d24c56e23af41ad51a17ebb2787 0xb6470d8ff7ea1337eb572817cf1c31263ca4e96e 0x8068b24bcb40c7f4750c4d9f81f5259a0e37b398 0x67603b87353795fd7b30c2fed2906778a7884380 0x3a4f63d7e933c5e9c03878ece8bde6dd2dee8c83 0x48d09c4afc5b9cc62b48ff0b693a91958d9fb5a7 0x8a968509b40f8680670a8da6704cc10dde3393b6 0x6336f9244569d915ea36b2e6d1b1e367f36e5296 0x3fee588b23eb931f8a9aa0ee7a1d0144e61b1bc6 0x83df80db41f7aea41daa374efd01818d26ee76c4 0x57cac519f2ea74d0e098051299809fe2e9dd19cc 0x83592ef846710aaf13b51fb391fec8bcc7706812 0xd9734da82b011e175babd54090ec909d6deb9b2c 0xdfdbddaea2f74c576b54f49fde1ac7fb92dae225