ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-10EC2B7F2C4F
|
Infrastructure Scan
ADDRESS: 0xa3dd5f1b36795fc13f8955bdcd74b360c7f1de13
DEPLOYED: 2026-04-22 00:38:23
LAST_TX: 2026-04-22 21:22:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Latency: 68ms. Protocol: JSON-RPC 2.0. [FETCH] Loading bytecode into isolated sandbox… [SCAN] Mapping internal logic flow and branching. [MEM] Stack depth: 5 / 1024. [VULN] Analyzing ‚Timestamp Dependence‘ in block.timestamp. [SIM] Gas used: 38713 units. Result: SUCCESS. [TRACE] Program Counter (PC) synchronized at 5405. [VALID] No critical memory leaks during simulation. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xe006a4c9cb5b19cc2cb10e980e0ef7bfe6903481 0xea8d83e7aefd46110ccabc3c09fc24b459bf6233 0x58551cfc4913d90327b8a495b440eadc2adf228c 0xe097a4ad957633844448b65c63614a50db70308a 0xb054e28f68b3deee94a6be6b0f77f6f39fdab989 0xfa8682dd94f941acc16df7284b0511689b05f54e 0xfb25ba25c0c6a6b645656d37b0c877f0f355c392 0x3e748609e30aa873c7833f6c74ab7cec2e1e07f4 0x6944e172af1a3b27117f851b73f8de98300570bf 0x025d31deccc020b1194388842c01efb16dfaa688 0xe1f444ae7268971979f0b9c2a0e42920131c8821 0x6b3a8112fa051c62ff7cd2b6b926e6e853500910 0x9c4c3202d6518dadbc6a7b973646c22a24a06d55 0xd32ceb4747536bd249d6da221f93324b56d7e856 0x6c1f4f4313a13ea1a72e1f0aa6ea5a638b983b0e 0x4d0e75d31586b0a46e251ffeacbd4d8da4ac2111 0xd0d7155fbc0be3cf3068b921f5e9e9d5b9480648 0x5d1b2648c147150a0eece34079870c1984a240ad 0x56419111e502c5457ec29805e9a1f048da1ed83e 0x05fdbc0be7dc2552e52126b48445bd629b80f579
796da11b4014dd2f9b49aac57e178322