ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-6A18EA98FD02
|
Infrastructure Scan
ADDRESS: 0x26af2e73e2c4a575c51ae32afedde87f4082c9f2
DEPLOYED: 2026-05-08 09:23:11
LAST_TX: 2026-05-12 05:39:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connection established. Peer count: 80. [FETCH] Successfully retrieved runtime code from blockchain. [SCAN] Analyzing visibility: 5 public, 9 private methods. [MEM] Stack depth: 3 / 1024. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Mocking MSG.SENDER as 0xd5692a7f8c594de106a263faa1d8695911087d6d. [TRACE] Execution path: 53% coverage. [VALID] Comparing result with Triada-Security-Standard. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x0159488e7c1e020723376dc1d05c0e08e1e9cca1 0xb8cce04f96db5e5a3eaf7e2bd52504fb32bd1cec 0xbb4ff4273f4b403290cd02500ff0e4ee2493f959 0x007a562b5b649620d5fcff5d73ee908e8465ed11 0xa5b4ac06eccb94bad9c4ed573b4262598ce2c09d 0x50de79051d2b27484e9aa28fcf336504cd00129b 0x9212a5368bb155c573a5b1a106d7011ee10f88e3 0xa49d46022705515f8d63c24dd7772493aca70b74 0x506e8df8acdd02056b53364153b5ad0a8537d0c7 0xeb15cd464bb2622daff6a1d89fbc994a5ec32d0d 0xbab9fdfd4080abb599eaaba8e2281ee5dce9545a 0xda8205eb8adebb69ab0acba251ef2b2d03f35234 0x9e6a037bb3cac53cee46af12bc6a7b55d6e22591 0x5a282aa146bfa809f356026ba190a845bb9efc5c 0xeca605e20a80a9fa0aa86b773a22d973a68b0136 0x509ce0134e14d60a3d67070db5af13c8b3260303 0x6f797de1a94e0d58bd4afbafbb109550eeabc01b 0x73c5ed4882779532f8b3eca211873d5a8e72fcdb 0xd7f08046123a2855f2469a13aeb66f989ec4dddb 0xf262dc886fe5f8c71858a4a58ce74abd1c3c8b2b

