ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-113BD5D823EF
|
Infrastructure Scan
ADDRESS: 0x4c0b10d3bf4282609f36ae5620491f240d1af898
DEPLOYED: 2026-04-30 18:28:59
LAST_TX: 2026-05-05 20:33:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Reconstructing ABI from function selectors… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Tracking pointer 0x708df7b7 in memory heap. [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] Mocking MSG.SENDER as 0x88cfef9231cb545100b6f2f00178d645ba33c295. [TRACE] Program Counter (PC) synchronized at 9957. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x75c44b7f1bb78f33271a49d18fdc1a4b24623777 0xd482b2617dee6cc5653b66a3ac659704f6f0d9a1 0x2a2e7188f08b35185dd34a58281a66edacccf673 0x91fdcc0ecb08e570e3178690785883ece54e29c1 0xd0573983b064cab7a1c84850e2bd42109b981a7a 0xb6b9b75c7abd52def8dabc8e1d8a0cd8750cb1b8 0x44a335e110be41625e093dd9207efbbcdef1c440 0xe08bcb1407e8496d434efe4ecf2a20e27068a14a 0x0b7ad39175ad205e8f12c69f9572aa7e3d20e9a7 0xf023a91c526857b7ec81c7a52dccc00b95fedef0 0x249451341d9245f9c675a1d63a8c927d82def533 0x8853352e4d9e044accdd9c3b4d8030a5266f51f8 0xf7ea7b7981db6eab54baa0dee4b7507f1aa982cb 0x3a8f33e7982b8761a6023ae9a9c53e7cccc1c872 0x2ac48a2ee95e6e46f0f2fd219d898cbfc4c2733c 0x9da155e06136dc123f2d42eacb396f5b207ce45c 0xe892cb529b707c666eba663fa18f839eb4ba16ba 0xc638fa491299b29144f633b8e5cc91b5ecd9bf45 0x905738875751a027c0a22427f5d892af927f68bb 0xa9cd6842870c3d67760f76d6e7bdd227321f3e47