ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-A4338DFC3B09
|
Infrastructure Scan
ADDRESS: 0x553e2f66469bce0ec882a2df29ae5277be1fa26f
DEPLOYED: 2026-05-11 13:01:11
LAST_TX: 2026-05-11 13:41:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Analyzing visibility: 6 public, 8 private methods. [MEM] Virtual memory mapped: 0x0000 -> 0x7c29. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Reverting transaction at PC: 2274… [TRACE] Bytecode segment 0xe9 analysed. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Scan task 070BE9B7 finished in 56s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x0df7f25dde6c11fd758c4d9b76f073acbbbc960c 0xda87112d54698fe88890c26547058edf3419e50b 0x79e0a55c723ea46a6f0a8be2a760b149113c0c5c 0x00ada8a5585263d459ce3c3c5fca095b1c8d63f7 0x192a7d5ae382ef06ef3671bf20629f8aad4f0d61 0x6986f758a1e6a31556b8339f936415e4a3990205 0x59d422022e6eeb11e504e159bd3be9157528f4b2 0x18b515ce162e8193099a0e2d1db9dae1d7aaf310 0xc84409fa1b40b8f7516c72085eedb4fea4f53dc3 0xc26762bc5eca8cf030f3ddb7f61197e81ade0ce3 0xee032bdf22b6f4262104e94420c9741590265210 0xecbd439617f21d3661dd8934ec34976e7be1617f 0x70b41279466ee24ccdb87d45eaf2090eb2b3b3c2 0x9a7a5dccc7851c0f141d07c4d608a29b3830548b 0x894ea0e40dfa7f797708d0e6f957081da35cdb2e 0xaec655814ee022c92f0992373046c02eea6044b0 0x39a2c6af8b2ccf7c611a0ea90a748058497ff607 0xa72188c445b4ad6ecee8151d5a7c6fc3f49b381a 0x0b701ae1480526deb7dfe7a2a9bd7b2d49e447c0 0x740a7d6ad2ce5a42870e490e17c02e27797e6ad3


