ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-EFD7DB395173
|
Infrastructure Scan
ADDRESS: 0x05d9fe6b71a77dbcab841bef1ef1a3406f33b62b
DEPLOYED: 2026-05-16 12:10:11
LAST_TX: 2026-05-16 21:16:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Reconstructing ABI from function selectors… [SCAN] Mapping ownership-protected functions… [MEM] Allocating stack frame for EVM simulation… [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Reverting transaction at PC: 1312… [TRACE] Program Counter (PC) synchronized at 9713. [VALID] Signature verification: 0xc5daef440d0fcc39050ff20c89385ea35c3ebef482ebc363b2ca188be9110b62. [DONE] Triada-Engine standby mode. Load: 9%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x1f683c4e845139a8cfc4f471922be47af2ec799f 0xf384f741197638b49240abd29bee1ea84d84fb68 0x57c44cdbe5da0e11dca6ed8e263a3f3c59099154 0x7c855b59200561ca1bf85f026933be66603e24ed 0xafcddf2f640a067021e9fe83ce33aa5e11317d1d 0xe3011477d29c82badbb90d5256c7411e462b8982 0x714607c13ede9ba7e7bb8762e6c5c9c8e8825ae9 0xda8ecd06686632dad76e55e9d0ed50259f5fc3ae 0x159ace03382a47b81fa301932a0eccee06bb4bd8 0x5bcb3809370dc9c50275032be1120cdf5d5a0028 0x95e159a14729453fa0232cc70e406ac128902ba1 0x475d6e6c82eae9d60237b4b0303987d4f80ea4a2 0x4f31c1b709bee1f6057191954faf79f74d2fa915 0xb31863b4d2dab6a724f5e1cd1231cfeb3901c3ef 0x55c5ee596a52a622fbbe4035cb86c8ab12491c27 0xc67afbe25874d0cbbd07572e31a4c070fafe7692 0x0b01be9d24cc8dd0b70d82d3e8bb743ffaf98562 0x5fa1dad7d70da40bac1fb613fe7df169f03c73e8 0x0ba2713f53c72a2dbc76ac983cdb0aa8fe3f0f26 0x341822f9a01983e0b9d8d5947e21e833893c9637

No responses yet