ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-190DF4EF8982
|
Infrastructure Scan
ADDRESS: 0xaa4d1af08e0ffbfda02b4bce169f1a5e3a9ba09d
DEPLOYED: 2026-04-28 22:56:11
LAST_TX: 2026-04-29 01:13:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Reconstructing ABI from function selectors… [SCAN] Analyzing visibility: 4 public, 6 private methods. [MEM] Clearing temporary registers for deep-trace… [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] Mocking MSG.SENDER as 0x9aad7b688857b7f93fa4b2c899c2cd69a64ca738. [TRACE] Stack trace saved to /logs/TRD-887481DA.log. [VALID] No critical memory leaks during simulation. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x07b00d861494e8e4531be40492a29b5594d70d80 0xcd374989a3869e40770f2a47f704d2e9c2c3a610 0xa12623e9608566c9f8625ca7409fdf84e41262cc 0xca181a7ee5ffc37abc76ac400d27695b295dbf12 0xc544354ffcded20d2e1e78ee66c96d772d5c1f45 0x359ef79d6305cbec9cdbb6cc8d1561639220c161 0x8a90f488726a8ed6ac2c68c854896da9d587837c 0x52360b363e6d8db0652c47113eb89b0ca4503df8 0x72c3fc796c4e1c87c7209faf287c4472e3e24b60 0xb1fbda4963402da01aad6fd541907354135ab705 0x558c88e750083468e6ecec2251cc3fe3ef7d74bb 0x53be0a314a0e0adde664834673792419f2db50f7 0x37bfac8c3f3f4ce0e8bb24cdfb497b1505588c43 0x789a0060157094465b7eaf09818aa5619968b100 0x58142bde248c330ee429db825045a3f1ad8a7f32 0xc93430586a31ace2e98787e7df56fd7aec5d0a8e 0x05c9d5f8800aebcd3166384f2896bd4e65eeece1 0xd7ecf2e4c6e1d7d92ccda2f833215fa6cabec4d1 0xc9631e5c24f3dcefa4f9477ea1f058de312a4d2e 0x242a60b68481f836887eda6849dbae76890f8c3b
