ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-2761BE42B0A1
|
Infrastructure Scan
ADDRESS: 0x1cc5659764fe5f750919a4af264145a4013f419a
DEPLOYED: 2026-05-16 01:28:59
LAST_TX: 2026-05-16 01:55:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 6CF38CD0. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Virtual memory mapped: 0x0000 -> 0x3f5f. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Mocking MSG.SENDER as 0xcbe1c27af861845580c68a06e064b4500238043a. [TRACE] Call sequence: 7e73 -> 57a5 -> 6d22. [VALID] Security status: DEEP_CORE scan finished. [DONE] Triada-Engine standby mode. Load: 7%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x5a3ff1dc76e075ef417095d2c366db047c737bd4 0xe30f0b62e8ae5ce2934151146dae5651c2288c84 0x0bc98d98038c916b431015e899a0755a89d338e2 0x963cdc4c39d6267c480d5abcdce13c566684433c 0x91264094430ad08472e18d2b929869661d05afb1 0xa20891110e522f056e258f5a013c3f290a945bd6 0xd19e248dc14152c6c2891c6062d987a5aeae9740 0xa28c70f92a1b2513edcddd29c2e5195a4b785ab2 0x40f033834228538d1bd1731f1d1e2b13378d3737 0x679d64a1b43d12bf05d7414a1ef3fd334fc8787c 0x1edaeca6054afbb948874d9514ff3b328600c97d 0x6e721ed2fe4b4985ec9af136ebb32acecc09a381 0x4d5234f3f249310b10fc5ba6643888b0db7012f8 0x46c36de72d6864db562fae6218d9ae7c6f4f5990 0x14cd5014dab28e4e90f8b3221115ff54906b0a67 0xf4af63385072bf7cbfd841c4054793daaae10ee0 0xa6b487be519152d397357e84ac4109dcb06d7f85 0x8ef699477219710ac4540919a374621f1f855510 0x66d6f4e4c180284291d90835e268d4da3f5b830f 0x23b7496dfc585ff6a6f3a5a5769bda84423e19dc