ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-6C1E66D10A6A
|
Infrastructure Scan
ADDRESS: 0xad42d4e261b97b000918645c1aaf4ddba902c549
DEPLOYED: 2026-05-07 18:25:23
LAST_TX: 2026-05-07 19:22:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connection established. Peer count: 80. [FETCH] Warning: No source code verified on Etherscan. [SCAN] Mapping internal logic flow and branching. [MEM] Virtual memory mapped: 0x0000 -> 0x81b8. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] State change detected in slot 0xe4. [TRACE] Execution path: 32% coverage. [VALID] Security status: DEEP_CORE scan finished. [DONE] Triada-Engine standby mode. Load: 5%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xd39517d38510610a248ed925e0e84d59b24c91c6 0xc53aba9b5b7b41b20f589982086b8af9124b6e9c 0x56a9c5e682ba8a38514d9efa92f37327aa56efbe 0xca43b76907dcca736e30ec570e95c5ee2cbe101e 0xe138722af9e2163146f80589d9800b617ed3fca3 0xfc616a706cc6ac5af230804a322d418ab12fda07 0x0d3f54fcded6347d633344967f4ec706f7198744 0xd54dd2ad3551c5cd6c0b4c68013364d9cae140cb 0x3931c3d9ddb62ee753e06bdbde93648fcaa4356f 0x89037e83d73ffb68b41691064c8a07ec2edca402 0x2fad6f96771f380b19849387be978fe7b01151e9 0xfa58070dbf1239b948c1ea8f69c392cd81fae665 0xa15d9991e14cd1a433606d646f1beb0d3ed83821 0xd34559168966ea2b70d9b25b667b931a2e177ec8 0x17e1d1a953626267b3968ddb1bbd86b948c0fb47 0xd7946e13cc1a2a4fd94deb2051dc7a94044d47d2 0xcacff43281340dac971f34932fcd43dc9f0ea8d9 0xaa401a0f5702a8cdc9a17c5c32c4468277929bcf 0x3d1ec340ac1ebaaa5a096d67180818def6eb2368 0x6bc793bca5a26dfbd31953b3cd0b0e5d0cbfac5d