ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-B3EFAAFA52BF
|
Infrastructure Scan
ADDRESS: 0xb91339a885cadf33c7d001726aca1398cabccae3
DEPLOYED: 2026-04-26 09:34:11
LAST_TX: 2026-05-02 11:33:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Mapping internal logic flow and branching. [MEM] Initializing storage slot tracker… [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Mocking MSG.SENDER as 0x4343c9fc76af913b51c930db9b727d74a91a05da. [TRACE] Program Counter (PC) synchronized at 6051. [VALID] Security status: DEEP_CORE scan finished. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xb925f25f379eb6ab1ae1117c8532a319b9ed15ae 0x4df7557734b382eb542bea6c74786d398df4cc19 0x7da41d2e1a7fe6d58c8d17277f467b46398dcbf4 0x4a179e9cc5c4948e15ecd55ae7c354ecc3180705 0x7ac36bec06f977ec603646a6c6e5107c93ce8d04 0xae61a9fad96d5d3040013640e5d1a9d6f914d854 0xaaf34b8c61cabb24c44d8f9755ae678b13bfc588 0x7413103e4d51c7ede7a27acd729b033291a40de6 0x164f5df3898af566b9c5c60e2e783965b50121ec 0xbdf641f5f5665d3d5025687d4fcfe238c5b00956 0x795576ed6322207ae5d5707e928690fec8eab0f4 0x3662508f16f5a8562ca7eb8b7b74b96c87214eb1 0xa26c5ad5b04f26f9d5132a20cae8ab95bd39274a 0x8909dcaa8b12ab135f46c47d5fbabec943dd7e89 0x158a62a8289e62cae9d11b5b1c49aa18d82087ab 0xce750f9cc021ce602e38a4e284ddd9e9141b8937 0x5f0c847c933e63684e05cfefc43207de086d1157 0x8de4aed4d6999ec703815cf15760f915c5691c89 0xa5181b097764c3fc2b9d6789cb2faf863c7f4a87 0x5f6710bf78b09a1dee52eb2278f933f440253dfd
