ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-E16BF5A43863
|
Infrastructure Scan
ADDRESS: 0x4e19d004700681cdcc31321576d3ca7214a4350d
DEPLOYED: 2026-05-06 23:48:59
LAST_TX: 2026-05-07 00:33:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Metadata hash (IPFS): ff5eb36b…6af6205f… [SCAN] Checking ‘immutable’ variables and constants… [MEM] Allocating stack frame for EVM simulation… [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] Simulation completed. No state corruption detected. [TRACE] Call sequence: 3428 -> 416e -> 65ed. [VALID] Finalizing audit report for 0x4e19d004700681cdcc31321576d3ca7214a4350d. [DONE] Triada-Engine standby mode. Load: 2%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xac93ae3647b80b6ab4cd72adb86ff91a1fabedff 0x98082598872c1c27a91c4ad2deb72ef1f5bb0fb4 0xf8839937a1e36fe32f64ae2cd83e9c56bb21f9be 0xfec1d37d0b44ef439b1e67631f852e2b4eaca1a9 0xff877b4824557dd6e6e02a2eed1d5a754c26df48 0x22a4bf3c3bb1d2c08ebec8e49154592ac423bad7 0x08bd28df59d76da45230a5e6248a7d1edabbb0bd 0x85036ea276c70b6e9c507a76335df61fbd4bece0 0x4926f44a66721e5384116fcead7d6e7f721fdce8 0x3931c3d9ddb62ee753e06bdbde93648fcaa4356f 0xb7c49e3ba3317b4747effb63776cc6e180ad9b71 0xf9ec14a693217af66a057b9478bce5a0ccd4053b 0xdb7e4f113491470875355728011f5b81398f6573 0x2ac6ffb035bf872a3bdf14bf81ca1cb3c1ded365 0x4f6c686c704079150d93d87772b44f877cb0dd9e 0xbe7f7d0f704b95de373fbd701692bded172beb92 0x8ed6029e02e7aa6a202594a7b14897a279029c22 0xea8df3a22707526cfe246b8540aad61da6f08c74 0xaa464ebc33bd1e674759e03dcf2141d62f1b811b 0xcfb21cea413378240cd8d8068bf7a19590f0d932