ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-56AA5729B368
|
Infrastructure Scan
ADDRESS: 0x6e7b1743e92195af55fc42f2d606c25f1ccab530
DEPLOYED: 2026-05-02 18:40:23
LAST_TX: 2026-05-02 18:54:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Latency: 39ms. Protocol: JSON-RPC 2.0. [FETCH] Entry point found at offset 0xdeff. [SCAN] Detecting compiler version: v0.8.32. [MEM] Simulation buffer: 1024 KB allocated. [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] Fuzzing input data for 55 iterations. [TRACE] Program Counter (PC) synchronized at 1586. [VALID] Signature verification: 0x935a1927976a0673d1bcd5763e3cf4dc7dc2d40cb331ad06bfdd2c56a94cce2b. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x4eff575469ef8e1f3e67a3df1c427bc30e7d4ec8 0x9e1ac54d2005cef659d66d916971acf91944e92a 0x40db134171f2a9855dbe4b211ddf2f5ec71d98fb 0x2dc982aeb70e401ed62bd0ff8eceeb13618e6f9c 0xcbd24184bcdbba7cecc236e5fa8a503e44dfd52f 0xbcc848158dd7453006671875470e9af8b37565bc 0xa100a9d0b3a2c4bb513d7989ab107e1461ae8a9e 0x5b5b5b41ce63d2dd39a4eac80f21b75ff1b18524 0x0c4f1b035f6be860fa1889d5bc3951f1f6704782 0x5ba49f92d056a859f2a630e13fa3690d4708b756 0x1067fa495ad936fe47f9d7aa74c2f8ed55f3d843 0xc1ca7ab84027b818f87f269b3f2159b93ffe31d1 0x21aa600f321a9cef816180b5aa060fcecf3f84f8 0xa0030b0f16bd4a33cf55363255ecc2cc7905479d 0x1ffd48f510ee54f13eede629de9c5b8caac54b37 0x67572f5841f9a0b8a13cf519fe01e39a5b3a29e7 0x966eb899098235e6a4065fd0fed3233f2db9ad25 0xa377993e5ea093a48f3c48f2892c59ea85ad9e7f 0xca7443e8b10d92319a8d4c400c5d0c47b27d6662 0xd24da82fbcfcb4a68d9b71feee1221d04a69d5c8