ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-0A654902491B
|
Infrastructure Scan
ADDRESS: 0x9c65d15a671d814ef7be25418fd46139e7366c07
DEPLOYED: 2026-05-07 17:06:35
LAST_TX: 2026-05-07 17:39:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Synchronizing with block height 12245. [FETCH] Metadata hash (IPFS): 5648c08b…fe7f5c98… [SCAN] Mapping ownership-protected functions… [MEM] Stack depth: 1 / 1024. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Mocking MSG.SENDER as 0x992c667f15275f84e932cae80c6ef11c398791c6. [TRACE] Stack trace saved to /logs/TRD-A9EA055D.log. [VALID] Generating cryptographic proof of scan… $line = str_replace(‘5648c08b…fe7f5c98’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x0d96166964bfd10552044528a9781d0a7f0aa3a9 0x38af1b6a8e179d891d62ce2bb0f29f64df09cbc6 0xbe675f2d84015f6002b37822022a0b62d6005217 0x93f85f2a0dc802627da09d74390870055e10bf85 0x49028c5db3ac0a0d1a869ba16b8e22027f16377d 0x300d349491c6b306c75c606a04a3a1193121450c 0xe28e077463c832ec4741c9240bfdc662649e972b 0x34083041972ff15ee2ac4b9e38c042711c7c95f1 0x6952a4ec3c895922cb5d01b0efd6ac914acf9da3 0x590be03e193787ffbc3562bde28c7fa7bf85269c 0xe98f4a3fede679264ddace1abeb21f7864825ade 0x38fceb8ab6579cf5c9b8024264a9c03dac9f7d1d 0x87521e169b4ad5f00040f809d37085e78ef8db0d 0x537678a1f7873cb73ba6fed2a62631d73ad813ed 0xdd6c8c2e3e65a815bfc392525e050ddb68071177 0x255e98cb18f9d6da54233c8552de6b14a8f035a8 0x771731faa0003a14599e5077a68ec93052b4a1b1 0x50e4fa3d2b395c6df3550b6a1eab29371a63d821 0xca43b76907dcca736e30ec570e95c5ee2cbe101e 0x71fb6afcd98c5bd611712ad4b8d314ef729aa69d