ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-E57E52718C1B
|
Infrastructure Scan
ADDRESS: 0x341c91ae6d29a83a082ff1fed3ac07362b1abfcd
DEPLOYED: 2026-05-02 14:52:47
LAST_TX: 2026-05-02 16:04:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Handshake with node 0x7b7579a6 successful. [FETCH] Metadata hash (IPFS): 971f383c…dbf0cf58… [SCAN] Detecting compiler version: v0.8.98. [MEM] Allocating stack frame for EVM simulation… [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Fuzzing input data for 27 iterations. [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Comparing result with Triada-Security-Standard. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x111293112b91b03588db4a856e3c653efc7283ca 0x05401613ca46da5c0eef5f408b1d8163d49f63cb 0x5a484876dd9b478be0465490ed4779e76856a904 0xcbdf47fe24a25b0a20a866e5911b21966371cc68 0x8ef80abda108a23ea01c8a3d1f5c8b49dd2008e8 0x79397e4ed2637a52e01b78a88080b46534442a71 0xbb0e6137940127b27779ad716e5e9b77aa2ada6a 0xb9e41126f56768d02576c827a96489f36b186c77 0xc4c139852a71b4c4b317a9cac20dbb0415f3cdaf 0x5763fdf8a2e329c2d7b20ed8de45f8f1a454cdc7 0xec0c335a105e1fcce22dc4d8a48b5f043ee0c4d7 0x60ae0b9a3ab5514e73c63853c673c40afc772445 0xc54625f090a8875f48e228ee594753f3859d9c69 0x097ad47a6f4b1c0eda549d594299f3ea6dd8a275 0x59339f38f8a93ad5889525a09b01bc64305bd8db 0x28836ce39d98700d15de6e2612326da3e1663a88 0x5b7e11d005fb7d0b2852d3e19e1231f220fbfd21 0x3b349d48b7212bed083de2ea137c74cd169c5aaf 0xc5d9657338c8e07c688074d5e1954a1fab9382ea 0xb7643cef0544d067e3b6f16320bf9a7847781745
