ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-0C8FA998C444
|
Infrastructure Scan
ADDRESS: 0x76c61b6140600429f50de5ac987e41672047cc28
DEPLOYED: 2026-05-09 05:56:23
LAST_TX: 2026-05-09 08:03:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Handshake with node 0xa403b0d6 successful. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Stack depth: 8 / 1024. [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] Fuzzing input data for 84 iterations. [TRACE] Call sequence: 3790 -> a7dd -> 05a8. [VALID] Signature verification: 0x22af4a46a55c11f666ebb6363b7bcde0f0b27f78bd0eedb67e9334d9574019b1. [DONE] Report exported to IPFS: 27ad1e69…d5fd12f5.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x6986f758a1e6a31556b8339f936415e4a3990205 0x92abe4fe37e80bfc1a7bc83d39c35d527d6cd335 0x24eb4f16c5e923a8fa4221618a1df79df0f49b90 0x0c03fd3a4ae91da149112bafd7078a3c36c301f1 0xf177867b27a05b72aaa63ecc06605ae4a33ea370 0x1d8cbc63ee5ef7b33cb1ee7b32ad90d619e4d3cf 0x5cdc4e325cef5c088ea164efd66e73e7b0ac86b5 0x0ab546fe9a817efd592e96be964b2643e8920135 0xdd92ee1ada4a6810666fedb68005ff9de204d33f 0x6d7bdffeb7af2005c980cbef2e5d7c2ce9755f21 0xe5a346b1659a0d70717e903e7d5d61d2a8d2d1ce 0x86ac3b72c33da04fd89f3641f89f88c5dfb95df4 0xfcb6a929db98a1d69b5f33a2f7e073cb7449cf30 0xaca58adc241d63e5a107e1aeb0f111019fcd28f4 0xea01ced3a6dd4f0bdcd0c5293ff23e83a75b9f6a 0x7623bea863e98bb33d86844d59208323f0a6873d 0xf12497ce11097d67520a3cffb8f6e7e2f7661b99 0x554da8bc3677424565c865071c16d33a0e49b9a8 0x655afc46160070070c0b991f59fc96379c89cc1b 0xeffe1841dc0d5573d2d6ca86fbae0b1f5245274d