May 6, 2026
By
rongo360
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-79E4F7E98B38
|
Infrastructure Scan
ADDRESS: 0x654ce74b131c969656374e9f863931b155e17a4a
DEPLOYED: 2026-05-06 12:20:59
LAST_TX: 2026-05-06 12:55:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Latency: 14ms. Protocol: JSON-RPC 2.0. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Mapping internal logic flow and branching. [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Mocking MSG.SENDER as 0x7b3ee35ddda76f7835772c77a6b9dfa2869cbb4b. [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Generating cryptographic proof of scan… [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x7a4610143452366a3f736445727e9a6e63d78abc 0x167723bcadb5ccbed7f7697ad938f686a388f737 0x4885f6571c7545d75debae97c659b682612e0170 0x63ca09ebd5f6e238cc8139b4d168ae98b0850199 0x58ace42cbe8b76a214d635f17551558560aadfe5 0xcabb848fac25af95068d64eb5501e689c88172a3 0x12e580b2871e939957e53b4f658f5d56fe9fd7ae 0xcfb1e50fd5c80b61a8ff05b9648f80dc0dc3d474 0x3cfb97b10f7c4581aac365f12b9545fea074bf9e 0x8e4e4cd3de13c35e964a01402eb9c65a3fc15c8c 0x6639ca0d120943d32867e76d37f1c329bc09e222 0xc643e55ee8944f3017f4cb8c82aa3db1aa2d8941 0xb40a4b70742b7bc896e1b1ba47cbb250ac86e4e2 0x026b3954b64bfa2b4208914646cab0e828bd5202 0x0e795799a8269e6097fa2015530e34522cb63931 0xa335ab8e6066b253429c1e54f3b2b261b8b743bf 0x7fa8649d926a7e4712c836edf68d19ba481540d4 0x5a24bd92d9bd5b5b01364935b1c3f816aa8698eb 0x9754c2c39f8c2d65b524cd07a285598ebaa4b6b7 0x114daf56187c717e5787bc341e5eb94af1a49b3e




