ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-3D49D1C3C5CD
|
Infrastructure Scan
ADDRESS: 0xe0b6d35f93e130093df1cca7cd29ab42627cdbb0
DEPLOYED: 2026-05-11 01:22:23
LAST_TX: 2026-05-11 01:51:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: F0357DAC. [NET] Handshake with node 0x6207517f successful. [FETCH] Entry point found at offset 0x7b28. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Tracking pointer 0xac006fed in memory heap. [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] Simulation completed. No state corruption detected. [TRACE] Bytecode segment 0x9f analysed. [VALID] Finalizing audit report for 0xe0b6d35f93e130093df1cca7cd29ab42627cdbb0. [DONE] Log signature: 123b2849e7e9de9e924588d063c52cd03e1bdbe8f328c3f9fd913cc022dcc16b.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x8cf5a7aa9bd56a64078b93a9d1bf381d0e99bb00 0x8a85742f9812cac44b845fa9b94d2084364bd5f0 0x5e316f593ba02cbc94039709584faed5de3ce85c 0x83949f4440b8ad27624214f2840f46de579da106 0x43e314d43b6cb2f389f481875d7d561c57204325 0x5bd53d24aa0ec7fcfbcb98df7f2c6c08410988d2 0xc0b04f5e5e1bf7ba710a17fdf79bb4dd86ceec44 0xc598980e02d16d0a320996f36bc85f9f605824fd 0xce281ecf08e1d37ceb8944dbdbb290df2fd8e326 0x3f759fd964add95de95684647bf99f8c7b2c18e6 0xb1a689cb35d6a4c7c8c0d8c74dfe533c139a09ff 0x91431fe6ad2904d0bdc229408f45c0054c800ed1 0xac357910ce7fdd735de1fbe470408d78bdcdba51 0x1a9e561276a76bfa8d2f9356855760717856a310 0x289e2940ff7f13a4070d2d59501f1aba9654c223 0x64a8518985b1b91812b85324bb0177f272998192 0xb9b7dc46185cd6132b7bf7ccb71eb404c0705141 0x0efad9d6a459960a929d9d85f976dcd4cbd95b3f 0xea950d2648a672142c0659abd3e5bc49b3aac1b9 0x9338a847a1d6218f6eb67568433505f59bb52d9b
