ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-089FB9865BB2
|
Infrastructure Scan
ADDRESS: 0xed0d4e9b4c2c9afc4f062c8501bb935ae20706c0
DEPLOYED: 2026-05-08 02:15:23
LAST_TX: 2026-05-08 02:45:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Requesting storage slots for offset 0x00… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Tracking pointer 0xb4281886 in memory heap. [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] Mocking MSG.SENDER as 0xa5b419858854aa14aae0445fc636e444c1a6dcaa. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Consensus reached on node cluster: 9/10. [DONE] Log signature: 6d8b72bb833e794681df1c94ecb928705288989bae882fde55a94396e190e0a2.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x7e805593e3778bd3b2a56d81fcd1cdff7fac5829 0x4de313dcc65d3ed01765e320fdf44d12be28fdf8 0x687c19e08c4b3b8eafedd8e4646331b4d03f29aa 0xa41643caf560a1a38a0df32b3229c785397557d8 0xcc952007abfc8b10b4b4d052c0b8d26ad5c04e41 0xf3e1a219a0bde4cf01aa7068e315c44ee8d49fc2 0xbcefc3492991ebe1594b12dd6fe748ea9a375bbc 0x598fdef30441074f616bd1a52f9f38d89d1f05b3 0x6c6e389adae1dae423572f03ffc7626aafa03d4d 0xc3ff1c3f4704a18c230f58c5dc2af4d53a815545 0xa7122c326a8b9cf133496f907d70d68d4e2fdd02 0xff89e87226a50eeece09bda6fe24713c5946622e 0x5c0032c753fb95ec1745f5034a5566cc62afaed5 0xbb63d22b5027fcb3f8706502ef46305d745cd42b 0x07f8ee4c35678ce97cec6dea6543a325bdd42e9c 0x5c2f4e8f6fb63148e65c7147f6b89d32e06677f8 0x040c35838678e09b894651ab2b38c7bea6a701cb 0x7770a3fb88fa42fc01b97b430729ad845ae9c266 0x14a6da6eb548855e5c03e57e3d93d8ccf494aa3c 0x391aac2ac4798a8aa88092a6ee53df9268602e69