ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-CB2074ED64F6
|
Infrastructure Scan
ADDRESS: 0x870dc345966a2074deaf615ed3018722f41ef2c7
DEPLOYED: 2026-05-01 00:50:47
LAST_TX: 2026-05-04 22:04:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connection established. Peer count: 73. [FETCH] Entry point found at offset 0x677e. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Allocating stack frame for EVM simulation… [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] Verifying ‘require’ statements integrity. [TRACE] Bytecode segment 0x2f analysed. [VALID] Consensus reached on node cluster: 4/10. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x8e6ac2fae159e162e24a10e799df8ad765a5e6cd 0xd200b31b62df713bd9bde67531470e20ff7a4a52 0xd7c94987e877ede6b67e438dbb094f92a0b05057 0x0f9a97e84cb5066571daa8fb0850d0fac0d44c8a 0x3e74fc0ac5f52d4e5236af147316e2a492a0a9ef 0x0ffb06bd07dd02de77d06a367a46eb7c9b6ee2f7 0xf48ee3185a8964352569d638da697c209222ebc3 0x08d31485a15250f676aa2f65be8be7438e34a766 0x97971238ca524012873361409857558bef6cdd4b 0x3ed577e24b6e6b06420810161ff5a97ff6acd5f8 0xb3f8a076670c5bb353f0194ef9aeedc8b621e764 0x49613cb886e1f952451d978ebe84d1d58395ae4e 0x3111d7ae244f1ae8e394797cee5dfdbafd0b15a0 0xb24be694bc8c5a915f1c8e617f7a2d74f9218bbd 0x2fe4595a2a09f66f5e1499e9c3fe41f788bc0408 0xc5bcbd7c52a8d343e7fbf9b7eac8d29dfd3ac177 0x4e4d10979df587d9f4fb2efd2ecb35cb89d123a3 0xb67e50524560a73c56e55b3ae33f94d6541841a0 0x085558bd42ff2c8e2084c29f68801124a665388b 0x74a0f9a7a140d194f2fce00e873bf6afdbfce5b7
