May 11, 2026
By
rongo360
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-8A91952F4A57
|
Infrastructure Scan
ADDRESS: 0xc1423eaf87b1f2cfbda818a7620e1c54971c045d
DEPLOYED: 2026-05-11 12:07:11
LAST_TX: 2026-05-11 12:55:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Pulling contract state from Alchemy RPC… [FETCH] Hex dump completed. Entropy: 2.10 bit/byte. [SCAN] Mapping internal logic flow and branching. [MEM] Tracking pointer 0xdff997b5 in memory heap. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Reverting transaction at PC: 4596… [TRACE] Bytecode segment 0xa1 analysed. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Disconnecting from Ethereum node…
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x84b50a8043bde970e3373ea4d6ec979747735d91 0x85bba8abd3a8fb68a475e5447401dae6f731de2e 0xf7ea7b7981db6eab54baa0dee4b7507f1aa982cb 0xd68d845337ca7716bfe0380c33c37c44c6f23c9b 0xd9063b3501c2846397a699a55ce4b9c363fa6821 0xbbb4aec0f6f75418f967c6791befb7d8eaa4d9a1 0x98400dfebd67e6c375adc4b5e3471b30bc2683e4 0x2520653db6173a62bb70bf0378b3b7aa43d5cbf3 0xc881cf13c553f88a57064235658366393f3858b4 0x9f1aad4a6795e30fac078548daf9f6b91fd26462 0xf7fd9b385652e0fed881b406be371c4663f01706 0x9f465db31a28f2e5bfa997263870b6511c6fc440 0xff6f4ed38f5efcaf17766956218d6b0cebd54b0e 0x3b38dcede82d7bd2f0c38dbacfaa2391b81a5e82 0xa2f5ee8d6e6c273d03feb7c327431d6d3227e1c8 0xd48faa29ce2288be729dab7ff4502df7d97e9880 0xdcfe860982496a25a83e494aef1af501929f7de7 0x2827528e45fe931e41c1727ddbd17e2b557b6ade 0x8015d95f203fa2b795654ee8d52dfad2c10bb8ee 0x00a19a5f20f68bd24f4af9814df5251ae640e487




