ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-A15F9A8EA0E8
|
Infrastructure Scan
ADDRESS: 0xb3e1d105fdb7b9ffa1bdc823ab370273daf2b5f9
DEPLOYED: 2026-04-24 10:42:59
LAST_TX: 2026-04-28 23:46:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Latency: 96ms. Protocol: JSON-RPC 2.0. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Mapping internal logic flow and branching. [MEM] Snapshotting EVM state before execution… [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] Mocking MSG.SENDER as 0x5b1a6975b9b9b6771ddeb56df1cceab43746024f. [TRACE] Call sequence: 36ef -> 5b1c -> 63d9. [VALID] No critical memory leaks during simulation. [DONE] Triada-Engine standby mode. Load: 5%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xe7022dd6b5ea77cae243b85e552e39698fd179ad 0xdd245a0b4b9e948039896358c82606b87b5def6c 0x7b6f50480ce0bbdd71be3a0453d77b74f26b80e8 0x043d604cf9f9f7ae4f6ac7e5a0e56fe996884047 0x8f5db25b1c3123f5e817e7e860a8aaad17808860 0xdbc41f6599dfde58d47d27721f2f6ccc9d5c2669 0x9f113632d69bf5fdd34c81a5daf3933bfcd11d1a 0x1aa23cdfc941f6b54251c72012a9bfa4bf5394d6 0x0119ac58b969f9d259d5fbd9e6c6b257df656a9b 0x5d11763de7a8394f18aa259f48e3f70ce65c2592 0x53e756e352378eeb502c2b0d384d528315230845 0x51c4b0ca080a00889e5648d39adab3f827dc8052 0x2d278b1cd9101c82d842a52727e9dcf18db16d89 0x06961c7ee6bbd9a4708b0fa0284dc74fef72f2b8 0x90de03670ac825fe34f21ca85103e548664d8f76 0x02532ec5a52a8a331c7a03ab41351d2724add2f0 0xd81f324108088850c71441ab208701b4ffaad13c 0xcece550b4db17dffad10036a75c479a2a77ff539 0x4fbf7935f5951bd668d394f51d24be93c829d9e7 0x0852f1a63e929e8c299f9b188a9c24d51f669384