ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-A01CCB8B0F91
|
Infrastructure Scan
ADDRESS: 0x7f58f8853373398930aae4ab13fd90d74caec036
DEPLOYED: 2026-04-21 02:34:47
LAST_TX: 2026-04-25 08:04:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connection established. Peer count: 63. [FETCH] Entry point found at offset 0x4c32. [SCAN] Running static analysis on JUMP instructions… [MEM] Simulation buffer: 1024 KB allocated. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Verifying ‘require’ statements integrity. [TRACE] Stack trace saved to /logs/TRD-6AA6AA2D.log. [VALID] Signature verification: 0xa313967c8cf80db81e3bfd0f3e8e48efc1116bb429a9968b934bfd298be6d2c0. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x52d7f3f2dfb68bcf18f02477756aa99ac2291f82 0xcd6d64714534c351c31577ab874c7ea9adcd4ab7 0x92b869cab4d478da653f7f9278abdf0cbf19d1df 0xd9d8ab3e28232d12573fb091dde3a0b68b15a7b8 0x03e48c757a881f5b85557d3b3683b8222793ace8 0xdec9ca97ef0386924c10eb2412a39ad0925fefee 0xe3af5139be2225b549d8d2d0cfe61d20c15328ca 0x8d00da8b07eb0bc17271e47bdfac82ad7a3c53b3 0x2b12bad12d2e181f49ca156615589b08d61e28ab 0x2dfa1b5f4dded9bebce8f631ea342589e28d5f25 0x25c6a0cb354eac7bd8b6c479923bac3562789c78 0xc34ce86a412d3683196df5f3a5ca7fd9e78c3f0a 0x21a1f921f4de39ccb731f213e3d7ca343d8a2606 0xcb2cb0c581e33f48a2808c949513915d93b256bc 0x53866484bbf54903ac49ad2436427e0a358088c8 0x4282cd81eb5fd1bce14b2ead4b1953c33f4d3d88 0x2d5ddd989475090dcf9e25af66c8ff877c125689 0x81e621e6bb70f22a988d56a5dc6a020d8d9dc039 0x9b664a17d47308afbf99217381de004553dfac9a 0x3378e0c5b5fd277755e914025cd42d1d6fad2fee