ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-2362972A122B
|
Infrastructure Scan
ADDRESS: 0xd5e061a2d9aafe53c88ef8c022a7923894e4d7e7
DEPLOYED: 2026-05-11 06:27:35
LAST_TX: 2026-05-11 06:54:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Fetching raw bytecode for 0xd5e061a2d9aafe53c88ef8c022a7923894e4d7e7… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Clearing temporary registers for deep-trace… [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Balance check: 8.18 ETH. [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Signature verification: 0x0912cd315393ef865caa148f427a36dff1baa016a5dcc3522e3289d661a44cc4. [DONE] Scan task EE8E82A1 finished in 97s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xcec541bc7183911ab75ce0e4dd24e2c481420391 0xcb784551fc121002efc030eef5c14a531f22b928 0x6638eb1364bee853b9056f0c0829c23ae35f46c1 0xca5f19a73cba4b5ae61ab0d34af538ea370b6d6f 0x713272e964c9ee94044e4ebf0fdb360f2a5e758c 0x3ac87e165d13894672bd441019511b8341c78af0 0xb7fd2964cadd2fca9cc3f6bf4f7bb0ef1037283a 0x06278be437b84e2a653bdf1b7bf62ce2fd9c7377 0x805db1236facb50b68c522423953b5cfc1ef19dd 0x87f8c51b4e255775f11368b199eb586adc001459 0x9988e86c009cb2cf0f9c8e783dee155bca71169d 0xa3784bd726bcc7d28364280c5b3f90b6a324d86b 0xfaa727c9c41391b370bc25ef0f67c7e63aaa98d6 0x393aa5086466db871d8ecb32c76edaf810aae11b 0x517c9713780a132fc4e54739d675634127ed27af 0xc66cccfce3c237d289277c844757fd6b641bfb9a 0xaeed17b4b9ce811b17f0854be46a563703fed675 0xc36e928c4af933b0e961c09edae63e6ddb42104b 0xbf0415ebfc762b4166e198736a15ff0b53744e43 0xac44f4f3482426c7e41597d730a15a581fec3e84