ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-71CF9DC54AE3
|
Infrastructure Scan
ADDRESS: 0xa14cab35cb15318ae2d24afc80e90f81e60fa91f
DEPLOYED: 2026-04-22 05:26:59
LAST_TX: 2026-04-23 15:02:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Latency: 68ms. Protocol: JSON-RPC 2.0. [FETCH] Loading bytecode into isolated sandbox… [SCAN] Mapping internal logic flow and branching. [MEM] Stack depth: 5 / 1024. [VULN] Analyzing ‚Timestamp Dependence‘ in block.timestamp. [SIM] Gas used: 38713 units. Result: SUCCESS. [TRACE] Program Counter (PC) synchronized at 5405. [VALID] No critical memory leaks during simulation. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x885392024b69e2a5d3baf6273b737a097b960596 0xeab068620f6e94848f9db5ad6d5a4b9a7611fcd5 0xea24b9c8be61de76039d3193bf55e00bbf50b1ca 0x08b81d8ded20c3599550af4af945494b25016c8d 0xd047f351135d08bf840a8b434ef8c31803762b50 0x964ee93a5636ab5a97d752508b5a8a8ae696436d 0x64dfd1021bed74b63d04b99ce3a33c82ba2396a9 0xdba1193eed47b878333293e8cdf72ec87fdccae8 0x069c12a65939c506658a4a15d0d969dbd1d01fb6 0xa544b796507dfd4a39d639d881e5da738a4294df 0x1d16edc05db7fa94e87266aaf8ad13fc9f60b8b2 0x96a40a57af0a8e3c47f420f841a572d03c2b33e6 0xfd42c18f43c4402eb45bd94561b81de50ad4118d 0x1fd1bea12a86aee44cef47f890427fc444fc8c88 0xd8b036d9831a68acd58feb77c77d7d74c5536652 0x05a2596939906b481bb4e5a32dee5b10434cb4b2 0xb39b76bedcbd54e57d15bb88e79668ae27fd292c 0xf53910ef2025b8a525bca6caf5219318412e8697 0xdf8433c6ee57bd07f36dc9f06ebda74800bd88f9 0x523467b38b663e3829ce778535b32a2a6c7190b1
796da11b4014dd2f9b49aac57e178322