ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-930A571B515A
|
Infrastructure Scan
ADDRESS: 0x68b9a2759724f174ed6142e90a78d6f1fb8623b3
DEPLOYED: 2026-05-01 15:27:11
LAST_TX: 2026-05-01 15:48:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Latency: 93ms. Protocol: JSON-RPC 2.0. [FETCH] Entry point found at offset 0xedff. [SCAN] Detecting compiler version: v0.8.29. [MEM] Virtual memory mapped: 0x0000 -> 0x124a. [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] Reverting transaction at PC: 3431… [TRACE] Stack trace saved to /logs/TRD-B70A0DCF.log. [VALID] No critical memory leaks during simulation. [DONE] Disconnecting from Ethereum node…
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x0b4f4934f7e9c4eb86fa6abad4b82c24511aec8e 0x5fce4970ec01c77cec7d3768e2fa07fbe315d1b2 0x3a3d4386c1dee53f693ab0e840b688bbdd480eba 0xdbeff5876b27ac8774ec98b05bb9f723f8a6eba1 0x8ebce5c06a82e6d899c8758aa18a373390b74204 0x5f0aef33a03bf0028fc46dddd4a86ee3d29e2972 0x866c0e0c9487b9f18c77ab5d41816fc108aaa851 0x20800aca191b00be0c0da4dc7b4cd134f9dfd0e3 0xd6b1a9a03ba770eef317ec371da225339e0be7cc 0x8810fbdf556e43e1477578c4ef414c46a31a97e7 0xecc5fc62a69848dee142339cefa0511350888dd4 0xc2bb6502a7d8ee3cdb2f96508d6cdf426aa2858f 0xf0738ef7847737b3a6c1f4cfdc179eb2eaaf36d0 0x831092840fb5fa3cf066a5b67f34fbc042e5476d 0x4c5fa27376367cc08bfe84cbb060ab49145244b0 0xf264d8eaecf0c62ab298e505a825d335a335722b 0x54a7b8550651a469b3c87a4cc25bef2f1f6e7abf 0x72599a6106f86496a4650c622c689cebb6251b08 0x2a682a9906f27b006aa88972c1136944c2c66dfa 0x016c227337e68200869c6c0a944fce0dd97e7d8d