May 14, 2026
By
rongo360
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-53171A6E9EFC
|
Infrastructure Scan
ADDRESS: 0x8c4724a52119758093a7b32295b5122eed6fd5f6
DEPLOYED: 2026-05-14 00:25:23
LAST_TX: 2026-05-14 04:54:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Allocating stack frame for EVM simulation… [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Testing edge case: Zero-address transfer… [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Comparing result with Triada-Security-Standard. [DONE] Scan task F75E6914 finished in 11s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xd7f08046123a2855f2469a13aeb66f989ec4dddb 0x59db5161b1d6df0a249ad37aafa53911749c9cb9 0xb820b7f47e125ba6e1edc5e34399b77b3f86a458 0xee56a79717eb5bfeab4f9afd9cdfc273056d81f8 0xb39d54d6e44a622ed4a1edbfe7a1960d1a147422 0x90149b92f4270c782bb553b60a0e9be00cb05031 0xd5d85aeedf4135ffddbfc6253f75c1fd391185e4 0x192a7d5ae382ef06ef3671bf20629f8aad4f0d61 0x72c49d27535139c849f2c2330cd20008e3c3ebd2 0x03571992cb525c00041de3c5c815258730acda06 0xd664dadae9f286d427d60d74aad307841b31289b 0x340e31272eaef3df0095360e98e0f1553f887259 0x74f6483a035b44c90ea19d8615c90435dfb6f616 0x74cab194af5b1908fa757e7057c5ef3e6d75dd50 0x9e7ec157e0ae2f7a090de795d2083a5e9bc54ecb 0x8069a806a56bccdf923d75d193da962040c3ca55 0x23de5fa231247f3ca1954e20c302569eadf917ab 0xd0a4154b21ae9cc06e62999e0746cae795a64a7f 0xb8506612539ee6c13d0d11ae6b4a03a6f8c1112c 0xb3546a11ed1d5933fd7dd95ac38591a1bb05ba9b




