ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-9DC70BA40721
|
Infrastructure Scan
ADDRESS: 0x749cf5c70baaa1bcc2accf467f98a08a93efb498
DEPLOYED: 2026-04-24 13:19:47
LAST_TX: 2026-04-29 18:19:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
â—ˆ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Handshake with node 0xce09197d successful. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Analyzing visibility: 7 public, 2 private methods. [MEM] Simulation buffer: 1024 KB allocated. [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] Verifying ‘require’ statements integrity. [TRACE] Stack trace saved to /logs/TRD-F131E76B.log. [VALID] No critical memory leaks during simulation. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x2e07a8da9292bcc8d1e9a0262f33fba04471f3e1 0x164bc486fb37a86b2854ff340bf67ea85afe7b44 0xd4216a33ef06925037d891e423a0cb81e7c2e980 0xbd179760c4d0ad6459659d2ab72e023bef2934ea 0x166180ba73352c3a196757bf8fca9256ad5abc2e 0x83a2ec9467dc3e544a4c3db7a0b810d06099e564 0x939a0e92dbc82bb67d13337831f86b951cd75122 0x117a167b67c7e24f53276eb417be06382a2c3d15 0x6267406e45957374681df3cc75f62d887bd1883e 0x2a311521e0181a5a9cef4955ff55564ebf3a7b10 0xe7d30d3d7ecd9ddecf1f862ac1b66c928e85d395 0xd0467c7e53233a0af780779e37ff5e484b683a31 0xd3ef50500847b5ffb59baaf9fcc8fdedcecb7c1f 0xe790bce2cfca2d9e42c1586f5015db29ea6fb945 0x8615379c82f2ee30920b643001a98a3f3581de3f 0xee749194f70f01fb14033e32ae3edcde5a28d46e 0xf563ec25b097e62b4497a62406090720024f1c2f 0x891af5e2e20aa8520cf23fc920b0129c69d2e9f1 0x5fa12d0e341b36a0b6b930683f88f2dc288f6599 0xf3b195da77c536d4477cbec2dbc1498804cb0fce
