ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-F9E408865DF4
|
Infrastructure Scan
ADDRESS: 0x467cc4f584782623529a8ecaa88bedd81f180edc
DEPLOYED: 2026-05-16 04:49:23
LAST_TX: 2026-05-16 11:41:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Handshake with node 0x87b2ee44 successful. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Running static analysis on JUMP instructions… [MEM] Tracking pointer 0x8981b644 in memory heap. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Reverting transaction at PC: 9185… [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Consensus reached on node cluster: 2/10. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x2ca2604f982d5cfdb4048eed2e54100bb377076d 0xdf84e1d83db0027ce1bd451925d6410d597e7e4d 0xd641e41152aae30e2625031232f2f5f2b9bd9df0 0x7ddaf86480cca83b0c93448c1cb63e04584816c2 0x5202a1e532a3b8fd314258dbd210e38a5909bd45 0x77b2f65256613af43d579a9416fe8e6196d189db 0x4470a504bec5fcbee9c5705f8e62237eff4a3896 0x622cf0530f23f1e2a2708506cf2043a6d8833fc9 0xf4c4119d0b4fe43540ef08bcb5646debf8f51676 0x1eba9d16858bd5e6d8e1bb2876740032f093c344 0x39aa16ac1b638045183cf555fe799a23589aeedc 0x2cb7a32e5c37f5e5eb828634721fabeb564395d3 0x3b9d027e46f29bad8b62de869ca6f5ab4b72f840 0xc8e10b0d469900d5f076cc4e0b391591c10b5bc9 0x69e055053f51786cf92741628cdee7e28a08ecac 0x2feac44baeb5e5c68a752b75cb9c690001afaa5e 0x9caed2fbefb883254472ec4d266ba80491b5a881 0x4169fc8de670fa012896665e1417067a61fb17eb 0x80dd3c791903fa7a5a35a575ea934b8ed0e7f2fd 0x8c99df275a54fa05731a8c561b3341227defb2dd