ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-E5444E7257F2
|
Infrastructure Scan
ADDRESS: 0x041ea746cdc9dd87aa6a3ad4d29859b8c4c11cec
DEPLOYED: 2026-05-01 00:50:35
LAST_TX: 2026-05-02 21:34:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Identifying function signatures (0xe5d3801d). [MEM] Tracking pointer 0x43d1667a in memory heap. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Fuzzing input data for 99 iterations. [TRACE] Program Counter (PC) synchronized at 8113. [VALID] Data integrity: SHA256 verified. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xaf5020a302e7b3a7f424393a0f1ba6336dd8bd34 0xd8f0e0acc2ec3b858891db08eb9eb7056085ce94 0x9f98d466886d8ee5ea584e51290624b054e636b3 0xb4c9a4a094bd6765b79961a887e4db52eb104ec3 0x5ee2d7398ce35a591c30d736007feda8f4cfec95 0x201cc6d0adffc50209f0518e18402bd9f4533843 0x7c42f74e776c3897aa5bd0854d4b3d1ee5318915 0xd1dcbc1ce1d3e528de03dcfa534feaf60da7e8f9 0xd66e5d3ecea3de5c86327654bd251b24687e8ed2 0xd5869ea089c89c91cb914e95b778b8989f88cad0 0xd18df3c05d2d11bdedbd9f7501f651e43b9bd986 0xebab5f27b47758edea325ebdb8505703e51c6a25 0xaf047152ce75d0283688bb02d875b8bf1a3fabd8 0xa454da99bd26de1a65089e447e295e12c9b426a2 0x328b8a0292b2d6742bc26f9d6ffc8bbdeedd089e 0x19be18bf9a2cc44c126b3051ee36ed16bd63e05d 0xe6aa688752c903751b84064a12d7a51cbb0fe560 0x2215fa3d42268ef701dd90707116c5e7282c82d0 0x4c0831343c4b387a77824989fc2b7fd534441e9f 0x6c90c2ab54e808c4a45c379cda5ab47c0cba086e
