ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-3E25066A5053
|
Infrastructure Scan
ADDRESS: 0x43a488315ad6d670a360d27d68e71f39f6a06ca7
DEPLOYED: 2026-05-13 20:34:11
LAST_TX: 2026-05-13 21:09:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connection established. Peer count: 96. [FETCH] Entry point found at offset 0xfa05. [SCAN] Mapping ownership-protected functions… [MEM] Tracking pointer 0xd0f3933a in memory heap. [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] Balance check: 3.47 ETH. [TRACE] Stack trace saved to /logs/TRD-C0C69187.log. [VALID] Finalizing audit report for 0x43a488315ad6d670a360d27d68e71f39f6a06ca7. [DONE] Scan task D6AFC1AF finished in 52s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x06fd1712745b6f1f8456670f2d313e573d6a6a4a 0xad7c2d4bb33fcf39ce53d1e62e1da6f45ff08d9c 0xc67afbe25874d0cbbd07572e31a4c070fafe7692 0xe95f0f0380399660b55389f5742b84e382526b44 0xa5b56dd5c583cef61aac1094a6136f21228ba6b1 0x6458392170ec3551d487c7e8ad9efb80510b67c0 0x51b0ac5b5a672a108f7867523f8f16a8096cc8d7 0x9eaed4187711060e3ed5a41c430835754baf084e 0xeb15cd464bb2622daff6a1d89fbc994a5ec32d0d 0x0bc796e1a4301f51abf8933c5c9d420f961729d0 0xf4bafbd27344a1b721e7c8ce6adf97b074885b0c 0x1dc13c89c58d5c8439f17e99bfa6313e288210cb 0x14e39ab61e389ba0b56b56c1796bc20a43e11f83 0xebf2ca3612f6f606008bf1f67d181278abf11230 0x3b99dd71eff85cb802435e182bc8565f39b69745 0x0d3e24090342d5eccb9106532a317dadb6c53447 0x5a039adfcab055b6f8cbf3ecc7bb052734ce7c9d 0xf5190f3bfe6b86eb7a8c195ff202bcdde5a974b7 0x554ad8f777a18811662acdb96558746694fc0267 0xe5057822f7378bca34f0274a9ae4064822b4ea31
