ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-2142E5FB3004
|
Infrastructure Scan
ADDRESS: 0xa1e0018350d8e2382c4c08fa783fcb2b7fd7269e
DEPLOYED: 2026-04-25 14:39:47
LAST_TX: 2026-04-28 18:34:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Mapping peer nodes for transaction trace… [FETCH] Reconstructing ABI from function selectors… [SCAN] Running static analysis on JUMP instructions… [MEM] Simulation buffer: 1024 KB allocated. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Verifying ‘require’ statements integrity. [TRACE] Debug: e51a3221696ac41d. [VALID] Comparing result with Triada-Security-Standard. [DONE] Report exported to IPFS: b0597873…929deff6.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x25138d10837ab0278eb860454e1045f2b92929ab 0x1d94f2e493b5aefae7dcdb479aa532d66f86af96 0x688a4c730e3c2d9a22101983fc41cbd1b10d64cd 0x21ed5381a79f7f6f4cd59d1c9952f57cec978fcb 0x07e94a82c2da6be1e0675eb4bbcf3a7b15378027 0xd694f67e9109d2bb91046e3151faf5c008fedc29 0x9aa946f975083ba6c653dface75a977f5a65d5fd 0x4f9871b2ca9387cc383763933e80e45e747d74e6 0xf9441fac0dbaae55c20c13283230b6b46c5b272c 0xc70bd7f0c8d5b0136f9c90e5165716c86cf2cfaa 0xe933a78bb4ff9d3238ca60d6f823a8f51aba6246 0xb1800e55e143c935637317b605f099403a71b1b7 0xbbe9cf823d15a383980a09c8b33ee4cfbfebe83c 0xf4ea529a0ab404687200acf1d51addc2e21213a8 0x860546221bf26ed5afcf04540c01db587d5a5993 0x381533e6b95671382d9181dc521069f91eeb54dc 0x44c167c554ed55b68311a9feb64ccd41c9d73d53 0x0b497ac4ff15fac328f7454c2e58551eb19f7155 0xdc308bada44f4e9545951433d7bc59149761ed20 0xf34d85e8d318db7f9a916d1a94b4235070e8b3d0