ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-4B31539AF4C4
|
Infrastructure Scan
ADDRESS: 0xe42755c427b2176a32f47ac75850ec15aa2057a8
DEPLOYED: 2026-05-14 09:54:35
LAST_TX: 2026-05-14 21:29:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Handshake with node 0x3d1cfd6b successful. [FETCH] Entry point found at offset 0x0c3e. [SCAN] Running static analysis on JUMP instructions… [MEM] Virtual memory mapped: 0x0000 -> 0xdfcc. [VULN] Analyzing ‚Timestamp Dependence‘ in block.timestamp. [SIM] Reverting transaction at PC: 5165… [TRACE] Return data: 0x940dbab3… [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xe310a46323d3f229b93f57038a7a3a2594392f6a 0x36d2d8fbe78ed3d9bd834ec33a96b21e83153e92 0xaef2fe972699d75a93eeaa19609c3f39ac089d39 0x234b7e4c30c49b8eb3e8474a196e86acfdad1b8b 0xdfae70ef6464d170fed054b7b93b9bb51dee8360 0x9b8541b251a3abce6bbc5419baa478bbc6b11e00 0x571c58ad432aaed18d81fca7f4b55bb4bd32280a 0x99d96d0db00c62f7f2adcf276e8544d3ac23fbc8 0x4450e36893f443e479c06727426d1c1e8babc60c 0xf156445f422962b918f5ac975bc6e4bc1f092f02 0x7327a6da88819d441c312e7265f7132cbdc525d4 0xd06afb04b82d2ce2e963683f55a8462236fb8f35 0x85345b9d4dc6bddc4004bf6d3911c3d0567fe5f8 0x4fc3b43565e592a88a32a5eeaf12db92f7d83a5d 0xc76e6b9e66fefa5fc4aae859a686788ee070e239 0x816071bf8c1a7cb92fa500031061a56565ac57a6 0xbebf4facef8e82f5a516e35459c377b955feb250 0x9558270b3583765a52b2a87d2282d6788ac64cb0 0xce4094af35d4d1c17e4b45b7be91a799f7f9c5b9 0x2d74cee9697787269bbc57eb264d558dc803bb77
