ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-8870A0B76375
|
Infrastructure Scan
ADDRESS: 0xf6576e0d89aed6b04946d39fd828d6418282cf9c
DEPLOYED: 2026-05-07 08:15:47
LAST_TX: 2026-05-07 10:15:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Received 51 segments of contract data. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Virtual memory mapped: 0x0000 -> 0x6bcd. [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] Reverting transaction at PC: 3601… [TRACE] Debug: bbc1f12d23b568a0. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Scan task CFD1A21D finished in 29s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x519daead0e772d5bda15e2030af6421b9b37778c 0xb55a48c1d0373b218a394152e0c509c89da003d2 0x9122fded65ed6b562243efdc9e55ff0bef5e7499 0x975872c7c6f73d61cb3cdfcc463e4b080ed0a19f 0xca289bd0989915bb54c78be296943f6e42efdd08 0x43198e4b9d6648ebe722203191a8a4489a001d8a 0x2119b1df27b03cffc15604cfaa265fcbad5d466a 0x3907d464cade916c6a4dc44646ebc9cb918847f5 0x62913bafd48325ef61c71b4d0d656aaca01399e7 0x25270cbb565d64068be88c8309726704e36b6f2c 0x20498b3dda29e50778314eb03b89cedbd4041fad 0xf1b253357d88a8170ad8190e2ab64147b226300f 0x2e0c811fb0448d4e9bf5b6f865ee653f4a30ca37 0x6acdf394d1b0f2e182b711c2edc6d58a633ce6db 0x69ded974b2b0bc7b6df02e7440086f570a48e3d9 0xc2836fa89e5f2b268b7a08dd19258215f70e0b99 0xb143af7bccbc3adea11e7916e253dd4bacd0fe3b 0xec9964cbb451e36a865e1ef499614ab71b021776 0xebebb5ef0124f002097d63e142bddceae4e012ad 0xc3fad3ee26e17946d3863787ef4e4e02b49d325a