EXTERNAL BREACH WARNING: 0xfd0d1b7f19a17177bb0bcb0c6d8e6e72b697570f :: External Access Warning: Debugging Port Open
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-40E6ABEE7F8A
Infrastructure Scan ADDRESS: 0xfd0d1b7f19a17177bb0bcb0c6d8e6e72b697570f DEPLOYED: 2026-05-13 08:44:11 LAST_TX: 2026-05-13 09:31:11 | Compliance Status STATUS: OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol VISIBILITY: INSECURE_DEBUG_CONFIG |
◈ OWNER_PRIVILEGE_EXPOSURE An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! | > Execution_Trace_Log [SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Handshake with node 0x3a1ac432 successful. [FETCH] Entry point found at offset 0x1979. [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Initializing storage slot tracker… [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] Reverting transaction at PC: 9562… [TRACE] Program Counter (PC) synchronized at 1770. [VALID] Security status: DEEP_CORE scan finished. [DONE] Cleanup complete. Temp files removed. |
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x68e56a1e55618da5900db0a5d3a1152f30439f9d 0x586303d7e44e658ddcba1e6cbb47ffdf1140a13e 0x5dda08cbf42f53cc79bbed3483785789f8717a30 0x32e3c1a93dda252d86e3d00ed4488a11b6c71534 0xc15cabcdb5a9ee033623081d93f9a0be13e8e8bf 0x2858d0b0ed969108d8c56a83ae3595ca9e9dfac9 0xfddddc1d32849b48b02251eadd8c4f87ecd49107 0xe3c92fc92024aea2db56e00c50c8deac8cb49366 0x0ef287c5525ddfe4bee31ff4e073737754bbaba8 0x09f53bc5a643e6eebc0c41a3ffd64ee6b9cd690c 0x6b5ddd3b6bf560280d0db401a5bbabc826cf6ab8 0x09d4fdb7176ef0e20af558e650d2dcd8d1f73d62 0x888d757fcacd0076da435917f3ceb6803730d5c8 0x2ad8cc4277a3fdbdf5121020b4fd7dd125893424 0xed7ae278977b89ef9f036a2a853366e4cf71ac79 0x5b19001839523842464fd65474e579e9ef130a4b 0x6c262bedf4247b954c97873bbe75663abc263d89 0x57f1c798d5002070f66c55f1684de12dbff9294a 0x25159c33eb262dcf9fe32b1b176160dd422baa58 0xd6f5ef6e3a0b9457936901feb37dcd7be5fa427e