ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-2EEEBA238135
|
Infrastructure Scan
ADDRESS: 0xf12ddd4688c7b710a6f7e2d30cfe6c72d98853d1
DEPLOYED: 2026-04-27 12:44:59
LAST_TX: 2026-04-29 08:34:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connection established. Peer count: 57. [FETCH] Entry point found at offset 0x4d45. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Garbage collector: 0.75ms since last run. [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] Simulation completed. No state corruption detected. [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xe9af11d5ac50365461a52828e040e7c9dfd6a636 0xf95fa354cafe3e92bb1f2e6899bb103ce8ab8bd9 0xf505dc208d5ad612643aa9ab3656a24dec2a0bda 0x4b7295aeacde3ff3a4f4595a0064cd299bd7dc8c 0x8c1ce1f5158d11f5a2c6634c294852dd3057a776 0xc14045969b3ac7ad46298f6c191826b2dc7f6e28 0xb4c34b253ec0bee13af9e220c6cfece0864c3a2a 0xb1791a117f8b2e19ec5d86727aa6ab54f2826ca5 0x7da41d2e1a7fe6d58c8d17277f467b46398dcbf4 0x3f49681d83d07e4adc900045a8a9f980fd5f5329 0x25822870c11c27c5e0410bbb99b74a1dffdc46ff 0x580df1590a03a40ad50c47d055dfc60d96500187 0xfc803d00685e4c61eec31f0e806dd77d1e9b6216 0xda2a7addc9be7593d4a887ed339311bb1e2766fb 0x65f8a065b96917132287e56ff0a9d31dc9b74b6d 0xaf4ea791d3d373b7df7bb4fbe1f63b0bae3fbe68 0xfeaad8ce5b22b822af7742bc93869bad378d31b3 0x8acd84be9c2afd562883438eddd4bb5874352067 0xaaed11c1b9f599676381bb518ce25d0aa9afcf90 0x9196135496a45cf9dc24b2f118f1b61ec0c1a3ab