ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-C6EB5E06B638
|
Infrastructure Scan
ADDRESS: 0xb36c73d4ebc307eef8a699df9a9b767f00c4ce63
DEPLOYED: 2026-05-06 01:09:35
LAST_TX: 2026-05-06 01:48:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Running static analysis on JUMP instructions… [MEM] Allocating stack frame for EVM simulation… [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] Mocking MSG.SENDER as 0x9b50539a7011c18aa0c17008449f74eba6a88459. [TRACE] Return data: 0x7c9355f9… [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x167e46c678565c0420a5b1e152cec332082feeeb 0x52bf69d3bca4ac36b76ace28712b3cf8eedd083c 0x3559ae53a06640401d141f4619d863f1788a2e23 0xa961a8f61c8db4e54c0ae9cc819424674e7f6e4c 0x294ad10a58e9749c727c47662b8377f34e82a766 0x87bc8b593916e39177e1496a7c8ae3eeedbe0944 0x76cf26bbee1dde48fc56d40373d3eaa044530256 0xe04c42d5da5cbd7448b5af08bba50662e1a3bcfb 0x3c0e451f043f965d8166d061ed0286ecca09c031 0x047152d76d840f0b91875ea2a88584720e3e1773 0x8810fbdf556e43e1477578c4ef414c46a31a97e7 0x977aed021d4be2a6b484dec0c52284e4125fb9f4 0x826529ad28c524d6d81b0996affa96c9c80e0f5a 0xbb11f7cebc3eef9f1fece34ba900bd3044591a9a 0x1cb6a23c0bcc7fef88d7870004a6180847829218 0xae8e0a989fe56be686434f50ffaac22302551b59 0x52d3e7084a5a3a2700e69f29e1eda3804096f76f 0xe200e1a7dff5f8c27f630961463653696f7396bb 0xca116243a2013ed33015c776ee37310b199ee80c 0x1fcf38c9fd0c12bee0261396468aad3a794e858f