ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-77A6F3C740D1
|
Infrastructure Scan
ADDRESS: 0x5b737b0c3e04db2a68257ef8db62d65d82ee1bee
DEPLOYED: 2026-05-10 16:04:35
LAST_TX: 2026-05-10 17:22:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 7FE7305E. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Allocating stack frame for EVM simulation… [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Verifying ‘require’ statements integrity. [TRACE] Call sequence: 3e33 -> 4b9e -> 1d50. [VALID] Comparing result with Triada-Security-Standard. [DONE] Triada-Engine standby mode. Load: 3%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x042dd8e117ec7bfb01eaa10a8af398d0d84a4c09 0x1b52541f1bf341bb138c064fa89a2f7b4c5d94c4 0x628d8a71420da4970af6efe3882e708097a008cb 0x9699bd3c32c7679d1b32dcb18c68ec460399ba9c 0x00818ae5552f71bc887170d45160dc707eecebb9 0x222685813b2718c7d1007e20864dee7d32895caa 0xa6758ea86ccda0287d35415c4a55e5818e7e20b3 0x94e5ab5613a908a1b984a5c0ff4f6bd3e6012404 0x2d68a2d08cae6f4083863f8ebc80cedf64a584c1 0x9574ab91fdf7223a690cb3aae38a85409eaa8594 0x8756c6446e6caaf1a2302d660b42cb026af514d5 0x7d5b0afb6a48fef28e70cb6df76710543260c48f 0x153635e17386e5b710341d6f32d175d077ecb6d9 0x53195944dd333f8afbd15bd22ef34243f8675728 0xf9245b9101677fa2a9208049ee8b8db1d293aa5a 0x385c5b1d786429fb2cc7c5adcda6268e58376fed 0x6f16f3a460854af8923f592cb1e593947de1acd1 0x1049c05e24a56b4617694c1423432652a9548b83 0x40bc9ce304e6c067cd9ec57b703b61c8c138aa4d 0xe8d1ae0c9fa3c853c783c0d0212d7039e8bf61d5