ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-0F513B9526C1
Infrastructure Scan ADDRESS: 0x239539093ac8f231e9d82c3e9cdc0b77d17f4a9c DEPLOYED: 2026-05-11 14:29:59 LAST_TX: 2026-05-11 18:15:35 | Compliance Status STATUS: OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap VISIBILITY: OPEN_ADMIN_ENTRY_POINT |
◈ OWNER_PRIVILEGE_EXPOSURE An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! | > Execution_Trace_Log [SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Fetching raw bytecode for 0x239539093ac8f231e9d82c3e9cdc0b77d17f4a9c… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Clearing temporary registers for deep-trace… [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Testing edge case: Zero-address transfer… [TRACE] Bytecode segment 0xac analysed. [VALID] Data integrity: SHA256 verified. [DONE] Disconnecting from Ethereum node… |
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xc3bc82b8d1d24112a3266f8d7384e07c0541c4c6 0x53a9c69e050092797dc2c66cfefe11f5727547cb 0xc2af1a14c4a043fbaa76262ca98c6e1ccdc31685 0x602a8900fdfde413655e9153c1e49a9b391a8022 0xf57552a320038f632c43e28d0c40493846d1e597 0xcba680b25973693fd462d39eed4ef14c0a814f51 0x361c251b6d7b45a67280573952eb2c0d60d60112 0x54245fd3d26e493cab86250c700f78b18bb5b68b 0x04260ea3a8cf981efa0ef56e1c3de90897399e04 0xe2089585c12ca4638ef072236fff877e961b8f13 0x9ecc4b20ff30592291d994193fe109a3cce10319 0x35b5949f9026e84b45c0f968dc60e9945bfca8cf 0x948f4a876f9b90e10f0f3f4809d3183b74013976 0x486f8285e12a225a2f4dddd5919e519b3eda476b 0xbc2104d49e256111afe0cfafe0f276455c0840c6 0x02299dc59efbf0a7095b0876ff93925a4d4bb406 0x95f8847657794b8f5dbf5cf077ed55c5b7d0be99 0x10a61fad5b8b93dfe99d21c419d1a9a038406eef 0x398ea3d728802dc680c932772c4fd7207c142308 0x4bc5d35d9bd31209b9a5bf13bc260f5fa77f0dbc
Rate this post




