Category
Date Posted
02/05/2026
/
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-EE5E4CE23AA1
|
Infrastructure Scan
ADDRESS: 0x9ad0f1b4c13b93997e8b75d60217d943e54690e0
DEPLOYED: 2026-05-02 09:43:47
LAST_TX: 2026-05-02 09:52:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Handshake with node 0xac73b8a5 successful. [FETCH] Hex dump completed. Entropy: 8.55 bit/byte. [SCAN] Running static analysis on JUMP instructions… [MEM] Virtual memory mapped: 0x0000 -> 0xab37. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] State change detected in slot 0x14. [TRACE] Program Counter (PC) synchronized at 6641. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Scan task E36947CF finished in 75s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x9d5632d161a8308e054ae963a4a4c098fb6b076c 0x06666c410367e7742813b62be41d8081242b23c1 0x67a1b31fe4e35e4de830754dc7243cd06d32aa8a 0xd167064730dc0bba0ba28385cddd7cf345b5e27c 0x53e6e2ef61e205ae5cd327783b4372ef76c45838 0x4e644dff647da635364f8fdb81adca0286905492 0xff88fc8ef4c420f78896c2256c67f1c911552202 0xc6117dfb4d5d05e895216f0bf29aa7bcd92d1179 0xf4792774a13253651352267c188ad98d718ec151 0x563c8ad8e2a6ab297dcf6f5f9759a5e086a17c60 0x6884934abe567cd40ea8a08e45879680aa31dfa4 0x56074f882c4c699945f499661653dd22f63b39da 0x6a2560f1e4bb5c4cb9baf63afde874d325cde419 0x6f43aa590ed99fde80cab1b6e959a6437b65dbcb 0x04051787e5202f71431ce2d32ebde0cd398de370 0xf9dbe0a05f5a7d4ebcb29f42898209a7a28cc6e8 0xb3fe1ad025c3e11a6e678862a39d738eafc3b403 0xc020c5954790a0de63ad398dfc9ee7f7d33f0a1f 0xe029966adc73cc23d148c3d145fc3f457a81da96 0xc8a1c5f9f20db316763bb5e792e47155414558ee
