ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-0B0FE30A5F39
|
Infrastructure Scan
ADDRESS: 0x52056ca3f58f491d131af2a84ecc599cbaa55560
DEPLOYED: 2026-05-11 19:20:59
LAST_TX: 2026-05-12 15:21:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 07F8410A. [NET] Mapping peer nodes for transaction trace… [FETCH] Entry point found at offset 0x301c. [SCAN] Running static analysis on JUMP instructions… [MEM] Virtual memory mapped: 0x0000 -> 0xb19d. [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] Testing edge case: Zero-address transfer… [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Generating cryptographic proof of scan… [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x62ebb6ac402e371c962222995f018301756a965e 0x4c0a44a1c0e1a2c82dad4fe03edb8b3cbf3781fc 0x3928f96443a268dc1a3b38baaa602aa56937ad5a 0xc6ddab0f1f24f6cf6f31856ff42228a143f07b3c 0xa2f5b0aaeff4793a132d3759e9ba3de2e3474c0c 0x2005f4dacf54102c1c70f624fd907311841875ff 0xa5ca41f7b692b2354fd7ce65843d380ed5c51bad 0x089f76fb471072457180ecb662dabf6529c7cc52 0x4d2d9ca701e9c7717e839cbc1b9046f8f2a294ca 0x1ade17f93e89122d9390e40921d11e251ee57161 0x5c5d94ffaf8a8b8ce8e64c9985aca210afa8ebf4 0xb7bb1be1f81ee7105487256697566c6632b6cc0c 0xdf22ce0de1c93bae44efc948770f65352631c403 0x42d9a90dd60a97c366ceb9ad6c715eb07328f292 0x83047a01ec992ac682d4701a3e45e025bc747394 0xf6643e1bfa49c62edebff68bc6c22adbf3323f9b 0x6fdece7411391eb55551ef84e8bc6c0c13fb17b2 0x7c28f8f920f1cad498bf25a58cbafc26affabcf2 0x789af7ac770d400523c843955f991a1af0e91b95 0xaa99ee88544f7f17d83da063a45135fd6229f7cf