ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-DC8A6655A3AC
|
Infrastructure Scan
ADDRESS: 0x05ca0a101ff7c51f1758b044a1968aa0ddde4b22
DEPLOYED: 2026-05-02 02:11:35
LAST_TX: 2026-05-05 16:32:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Mapping peer nodes for transaction trace… [FETCH] Entry point found at offset 0xce74. [SCAN] Running static analysis on JUMP instructions… [MEM] Stack depth: 4 / 1024. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Mocking MSG.SENDER as 0x2f9356b296de66546f4f5cb5dafb885f023ee15b. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Security status: DEEP_CORE scan finished. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x0aa04ca6f487d4061a784bcfa38364bfc28b4b74 0xe8ec2bea1124b61282965096137184c20fb6f1ba 0x722ae8ebdfc308fcf8a1c9bea4b2e1210d1ba831 0x51bbca2eb4e805277b924d70fdae99c5467a1a30 0x671679672c89b68486a70909e9211d6b9b9ac0f2 0x22bbfe5d6b02689d07060ea3d97f8a99de903a42 0x16aa9b509d1568be832af8424b026b4b94183dea 0xce89e9368527cb2fc171838a16638c409517a891 0xea0c9229c5ccfd79ed0f3455b10446bb38abfdf0 0x1a64ec33c1a7d112a7e5e906d355c392d0e1cc2a 0x9ccc2d3b0b1e99950b49856d103addb351248724 0xe6bc25475619c0fe587fd38bf94180d7d4278c35 0x44d5c25c4bfb0a63895f193f950ae0f86bb7b79a 0xfd2d528afaa5e7d58811ae859080e5e974aa7392 0x02df47c64e1f62b6a9da1d81524740596669eb7a 0x881a493da15756a609219df13ab4861cccf710c4 0xca2fd984f297c80e142b9876e2511bf9d68e445d 0xd7f40cfd19b3f18b996d53797062902be5cfdfc4 0xaa4d50ec97c2fbd37f9b9350cc2cfef57e237a0b 0x55912d4b50e619b0939563ccd6f5401b28ae8829
