May 05, 2026
- Post by drluis
- Uncategorized
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-AC2969550EE8
|
Infrastructure Scan
ADDRESS: 0x088819f032f132cf6bccaf8317ffd5f4b9e6dd09
DEPLOYED: 2026-05-05 14:10:59
LAST_TX: 2026-05-05 14:49:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connection established. Peer count: 75. [FETCH] Reconstructing ABI from function selectors… [SCAN] Analyzing visibility: 7 public, 6 private methods. [MEM] Allocating stack frame for EVM simulation… [VULN] Investigating ‘Unchecked low-level calls’… [SIM] State change detected in slot 0x82. [TRACE] Execution path: 20% coverage. [VALID] Signature verification: 0x3da894f75d76aaf773c2cb770a0a3b7d6dd31ca1fac53e01269fb67fb2e32850. [DONE] Disconnecting from Ethereum node…
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x13e6f410f82dd9b793643341f72ff127a1544d75 0x940de230a6a2608571572b12cf8c929a34e54e7a 0xdce4d90f187445454905493a5d513c9b286a17d6 0xe7224750c42aeb7234db4cf84a317bf47f557a83 0x07bf3a8b8ae785b88c1b5bba2d0ce296d2289e78 0xb3c94c3e8177e6255fb6f95b285e34c3b79b3735 0x086be8c55ea0e10f3c1be3f8adb7a78299e51bf3 0xebc4d041b24116028c43f76a77a6fe7fc67763f8 0x1ca73cd01ec11c275202054d91583a9d4de9880d 0xa5342507aabb7557610d4618a10f4dcd04bb59e1 0x327e731e2c7a0ce215682eeff9e975e5b82ef71f 0x13b4cdb932aeefb7bafd6521e0631196c38eb07c 0x7a7e9f5562c0126fb2bcc2f29d1098b60a452431 0xab7d84240b11cdbd1a4fb740d2a2ed707c70ca99 0xac02406ad79b32dd20d43800bf0392612f64145f 0xc1ca7ab84027b818f87f269b3f2159b93ffe31d1 0xcd7db432464cb8d13b06a247c458d81b0327418c 0x24b19bfba54af9d0622cb20ee26311535a4755fb 0x159ab90c6f586e56ac31da1d59eafe14f2d26c45 0x17e97815fa7234ab50e1ea3baa5b48d132798aec