ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-CAD4C4B92CE3
Infrastructure Scan ADDRESS: 0x8ebb2139ab06b249adcfa3f1f6c59f6f4a932402 DEPLOYED: 2026-05-05 01:26:47 LAST_TX: 2026-05-05 16:54:11 | Compliance Status
STATUS: OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags VISIBILITY: DEBUG_INTERFACE_EXPOSED |
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Metadata hash (IPFS): 71d43253…9348496b… [SCAN] Detecting compiler version: v0.8.78. [MEM] Clearing temporary registers for deep-trace… [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Fuzzing input data for 16 iterations. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] No critical memory leaks during simulation. [DONE] Triada-Engine standby mode. Load: 2%. |
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x265548331a567960c3690e9e34896262c5f169a3 0x7fef4f0df4729f81d7daffaadd507114e40f2e31 0x42b172322622f7b4f1518c9da0989060bf7554b1 0x38e67b8d9c631d7e4a811f309969f180fd67a766 0x987c1b01913b6aa36514ab0ae8c129b80928cebb 0x18f032c720ac6be5e4b6e42c59e831a9cd7eca4c 0x71c1b46c4287d85e61a1cfafc7ea3608f7495797 0x0a4e883043540ce09059d670ffd4b006acc7c60c 0x61c28cdcc3fbb365546c0f942acb118631c3ad7c 0x94ec0bf038f2246fb69c777fdd8293319d6d6ffc 0x64c589f3ef894678e46af3b851aa08be3f40a674 0x521e4fcbe4421177d60bfdf5efdc0421962722be 0x10fc8030bad61f4df7fb93fab14f13f202ee6534 0x8e6bbce70c66cac1a09a9cabed4821ef8866900c 0x2558aaf028ba8b52937aa8439871f2b948bcc122 0xb713d5f7144abd2fd1c7258bffa7b10bb6e39348 0x8004d57ad4185da236d233f73193b97ec75634cb 0x6ded13c65624487d257592be4e58d685619cafcb 0x2585275a8c822df5c9416875ec61a5c3a612e024 0x36a1d1639ea47ad968c1cccea2b53d41e12d70f8