ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-B0A19DAF7A86
|
Infrastructure Scan
ADDRESS: 0xb086c6d2fdd0ef2c87a96c699c9cb791808fbf01
DEPLOYED: 2026-05-11 07:26:47
LAST_TX: 2026-05-11 08:01:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Bytecode size: 8888 bytes. [SCAN] Running static analysis on JUMP instructions… [MEM] Stack depth: 2 / 1024. [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] Testing edge case: Zero-address transfer… [TRACE] Bytecode segment 0x42 analysed. [VALID] Signature verification: 0x46903fbbc278a11c3cc0ef87771a62bc7713141a48e07f17a4368a18eca5b513. [DONE] Log signature: e545d3bb743ffc63d9e5dabf809f62798ac9de2f6ca2fd5193895be5c617e21f.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xdc25257097c72bc439ed3abb5212938c854d1873 0xfeb88ffb16e4621ab27613f5cbde3c721372ac28 0xcc4b46e7b18a62d0edb325dc808153294e73fc41 0x005c5069f1090a380724e1a4c3cd39bf712196a5 0xca5f19a73cba4b5ae61ab0d34af538ea370b6d6f 0x40357a28192a36d39c6451c6b9b22aac76477c2c 0x2366658ac02e20980ececae2e7745904a17c1c2f 0xfb7a6277a117507fee8bcb6b602ef0ee7e792d39 0xf5c7e0925f69e3d3d578bbd3d7ba30aa3a933aaa 0x4550229d27059f92be0a43a206ede1e2c15b2a44 0xb53e0b79a4ceaaf231fa26928c9658cc0304e385 0x50d43e5ebdf056e22242d2d9df5361e2dc59a85c 0x7b9668fc4546f417d3de8e08c40841d5f851ed88 0x79e378d70bad0603b24087745e0601ee6db05c51 0x1a8ea302acdbd9432da9ae45842eba4e5f2c6a36 0xcc11d7e1ca47f3d54d8210c75b6fd87e9225b143 0x739a46144945f85d2b4942072215dedc96971d50 0xa78e771d66ecccf7b5b28d01b0c54d87f48954a2 0xfa60789b78a7bebfd7475104ab9b223b7d7e4eb4 0x3e3eecf79a3a5b9a02b00b230194ffbb2c5e9bc1