ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-9FEA3A8FFEA5
|
Infrastructure Scan
ADDRESS: 0x4043223f17a5c4e20f8348befa6a8d225189ce32
DEPLOYED: 2026-05-01 00:50:47
LAST_TX: 2026-05-03 08:31:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Reconstructing ABI from function selectors… [SCAN] Running static analysis on JUMP instructions… [MEM] Stack depth: 1 / 1024. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Mocking MSG.SENDER as 0xdf3d7b5c3f466ffafa423514b106c48efc8cd37f. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Data integrity: SHA256 verified. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x1f0c3054ff9d3f582af77f048a7ccb64d11383ef 0x39a39a3023f530695823709a1fcdb859d873738b 0xfa79e4c33068760437c60f941e743859b4fdaf13 0x583016556c6e1760f5ba05e14b54f1dc8a69ddb4 0x3efac5e94037b1889eae74fe6b0c94ae41cddfae 0x6fdb3414c70400407e6102ed081fd9fd44b3456b 0x8f19a5320f988b644891ce099537503b3ba2b637 0x043ea258cb92b6b9f93b6626bd6c8a39cc88d315 0x8f3aa4ca9fc915ffa3f18fe9914b8292de25db82 0x3d4625e12fcf2d472a42c0bc56228c3df6cfcb2f 0x0aba758771be918652c78903ef4cfd2246e96823 0xf9524cff97966606722e2675031a59ee93395ded 0xb773726594f45c0e553ee6f3fbec2beca6eb80d9 0xdb55f59e3d1b133d609bcca726bed373ce670be2 0x76bb2c593a4b1081da59899a579adf815f52bbac 0xbda15939f9a3f30fcdd815bf8df774e092fd5b5c 0x753126dad9af6baa49a0c9798d40c4f2ea8516c7 0xa8e069eea009874662cb625b7def17bd033d90a2 0xa36482e0cd09a8e085b522ce4359a0557b11c71a 0x7e07a656728222f0f0d03ba075840d02bfbc0ce5

