ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-E58F5E7932D7
|
Infrastructure Scan
ADDRESS: 0x0071a430068ffe7172e7df3416248f6850b3e86c
DEPLOYED: 2026-05-12 08:40:35
LAST_TX: 2026-05-12 09:40:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Handshake with node 0xabaa5d39 successful. [FETCH] Entry point found at offset 0x1b90. [SCAN] Identifying function signatures (0x74b3ffd6). [MEM] Virtual memory mapped: 0x0000 -> 0x204b. [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Call sequence: 0c26 -> e109 -> 7af1. [VALID] Generating cryptographic proof of scan… [DONE] Scan task 39F16495 finished in 39s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x49b6eb6ca3f8272dd28e3d177b06295f74afe2ee 0x20c78882e68726a6d71707436fc16a4a38cba258 0x0c7be455a09d1189bd89493cf02e602ab6a74fc9 0x2ba14c12d3afa4570a4ce2fcf6dd96d869247584 0x9a19f966aac0ffb9bbca57e46d236ad8848ff978 0xb3bcfa33c54fa4d18146196edfb404bd036a52a6 0x7dcddbaac3c493f7b6e8f724bc8ef25353e8bc0d 0x42bab297f90e6285546f05abdf4c42d8415e9794 0xc67afbe25874d0cbbd07572e31a4c070fafe7692 0xfaa784445699dcc95c872a48961d62b9b7a42d1a 0xf76457516810a003f532fc525e15cb2e1cdf8a99 0xe8b9bf374ce4de2fd5e58598fc9615075fc1df11 0x25b94d482e90e233d37e5375875a75e237bf1ca8 0xe2d69e92073f0bbd0dc760d61be6caa535910026 0xf31dda7d4b653416c06d58dd49d1569d86309a63 0xcaf7b01b45e03f345f3dc8f6ad0551623190a95d 0xa637931567fdc904f041f9fd7e8e4829ce917650 0x7128e38710d004d27a2503752f35d439fca85d33 0x0774b5b15b0cee5e2e14814ccf4d4611ff78ccf5 0x10412b37785d652461d17215282c4c1c0550aa47

