May 5, 2026
By
rongo360
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-497F6496796B
|
Infrastructure Scan
ADDRESS: 0xd32e0faeaa5a1b02a69ea331fb209c3ff1a2c326
DEPLOYED: 2026-05-05 17:06:23
LAST_TX: 2026-05-05 17:24:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Requesting storage slots for offset 0x00… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Running static analysis on JUMP instructions… [MEM] Tracking pointer 0x1b5d4cf6 in memory heap. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Balance check: 5.80 ETH. [TRACE] Bytecode segment 0x38 analysed. [VALID] Security status: DEEP_CORE scan finished. [DONE] Log signature: 29fdb9e2ce9e9518c237f1072e7685f150f27fb4ee033bc6338f1acf0da3890b.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x3df9789634995546b0126bc28b9f9fcbcb129f18 0x0b410f22afe431864cf85d15a436eab878d5cff5 0x68d811f71c49f3a06f15db5a23b43b26c2fe97db 0xf9c708f22ee288bf27d4c9663aa66f4376dee23a 0xa197b56f3d8b85f6236f0e4b5445bb73a2462a4f 0x7bebd0ef898faf327f894794ea894cf5b2741050 0xd7af24d0dc23f36883caeb7e11e751d9a3437ae2 0x73182c4945f32c19557884e66c8e4ab15a2bc45a 0x9a263bfdfe3d149a2d6dfc665073f45395e5a214 0xbcf39b15490f193a63ed13adb88083dbf0b9517e 0x87d869265c8180449625891948d7942552d869d1 0x9d2038d122706bcd4f3a1a646460045ce1aa78a7 0x31e97438f095196f56eb457a8c728d63fe6b2dd5 0xee4ddd544db8b6d3c9f0360272cd110693676f1f 0x359e4923012db7af38766f0b20cf668e88d9391d 0x03f20c12a47756ccc36cd5f5f62ecba9371f0d8e 0xe82c3686ce5739d48fa99d996249d165453ca0a7 0xc8aa4a7d79119b66ecdc190170b05dcaf4a90bdb 0xc1a07d073432193a3c3210ec20d14d0ddd4d5994 0x82ce39d94fb2806f72064e37f5d208e24d13a949




