May 18, 2026
| No Comments
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-AA9273916C9E
|
Infrastructure Scan
ADDRESS: 0xf09727d4a042d68cbeee514d7e28971854c8da4f
DEPLOYED: 2026-05-17 23:44:23
LAST_TX: 2026-05-18 00:29:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Reconstructing ABI from function selectors… [SCAN] Mapping internal logic flow and branching. [MEM] Virtual memory mapped: 0x0000 -> 0x04c1. [VULN] Warning: IS_DEBUG_MODE found in storage slot 37. [SIM] Mocking MSG.SENDER as 0xecb843ae6c9cb62dcdeb1147cf3ba60a6d90ad2a. [TRACE] Execution path: 66% coverage. [VALID] Consensus reached on node cluster: 5/10. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xdb1fa94856adec2388ade599fb2fc7e75ce87863 0x95e56b4de97a1f6bea4ee0fa7f1442a371d98bef 0xc979ae5a8551e27eb08f520f3d936292d97e33c9 0x2a10ce677ac505b45244bf35add3da1e5e87d9ea 0xe602c14e8d672d8c0bf00cca6438c141ff6c30f1 0xaae3c12176cc047fa0451b5a8dfb891925ac6ffe 0xaa6a91bde7166a82a22325b83657f633c1ecdc57 0x4d98ee857e9df35f8d364bf428f4d6e8fe19fe55 0xd31ee4d48d4545af29f8623790afca459f929a42 0xe6c35f7917503e202675fb969502d5ab807c2b79 0x1d4b2830ca5917e21c3ed8b8be40919bba8679f5 0xfe73b6c6d9bf7e1bb8cdba16882982fc342c0c80 0x55dcc71c825944786b7f3e48215791a587aacf19 0x226a8d451dd885af561921f42b845a64af267069 0x36ce316120eda048056bfcf1842f2c56a8ff6959 0x6e0fdecc906528e17f4437bda9a119dffe4ab5e7 0xda36ab65d5af53763cacd63ae7d441932032326f 0x128d8268eef4140f2527a6f97f00b4b2a90f25e4 0x1a4d23403c31ba26a4b84af09364d503ad2bcc68 0xace4549eae74ea427ac04ce0e04409cae0ee546b
