ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-818540CE0753
|
Infrastructure Scan
ADDRESS: 0x7790a0d62b3486eaf8a9f3cd54f917b8dc98e272
DEPLOYED: 2026-04-24 01:39:59
LAST_TX: 2026-04-30 09:09:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Fetching raw bytecode for 0x7790a0d62b3486eaf8a9f3cd54f917b8dc98e272… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Stack depth: 4 / 1024. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Balance check: 8.96 ETH. [TRACE] Program Counter (PC) synchronized at 6807. [VALID] Comparing result with Triada-Security-Standard. [DONE] Disconnecting from Ethereum node…
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x140fc19be930f70f4d5c2c0038ca274ff224ff81 0x7fd87407d824f7762e054caa45b29253b37cdb66 0x13aee3cc3e6bdd4aa96f3196afefb205008f4633 0xbc5cd26cbbdd3f22bddb3950999ebac7d8377f22 0x91278a3f56ba860b363a5f65253a95060327827b 0x27c5001b0a3031913a7bb8cf54c2b4f77ee6c102 0xdca5ba2eabe2a1d4eec59e4cfa225e47f4b5e1c3 0xc770356cdc74d92604cf43cda915450e463faa20 0x4dd39d3433ab7759aa62828a3e1ca29bdd3481d1 0x57e6c5ab1701de8591896d979f615f36030d6be5 0x61eff8b59323db12f66cd5a48e90215b45383f8e 0xc3aebfe377dc6053021545dc9cfdb91ad22dd109 0xe6ef0632454d35c157656d0108f7e619147af763 0x92ad8c50bbedecb426bbf02fdd734675b1d8c897 0x79993ccdd689e8388bd0e2a22d486f417c4ebbfc 0xf9968958c7cce035b6a1fb9548d3cb925864e20b 0xa389774c1ac4d3452340b3d9fec310dfc3b2c28a 0x41307700101c4f52b08939ca3834eada4fc11566 0xddc753549d92dcde10361ba39adc2847c8e07945 0x578e663afde52cf5cc319124d012be84e752e0d4

Recent Comments