ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-45E5668BF987
|
Infrastructure Scan
ADDRESS: 0xb4ffbcce990a9a0b5f84722ba2d5db4e7bfc9d11
DEPLOYED: 2026-05-07 12:19:23
LAST_TX: 2026-05-07 20:52:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Reconstructing ABI from function selectors… [SCAN] Mapping internal logic flow and branching. [MEM] Allocating stack frame for EVM simulation… [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] State change detected in slot 0xb4. [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Security status: DEEP_CORE scan finished. [DONE] Triada-Engine standby mode. Load: 8%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x0c08c707c9aa2968f72002126046d4d4bfdbdb9b 0xd4f024e0fc519b327a3c0aa82b2783c8672917f7 0x4684b2f4f9ac9d7a430e6b3185f7512ded4b03b0 0x5d51c106d4d7e279fd0e8cb34916dfed63d0c5d6 0x8b87c4fd61aa24a578ba9ae30d6165d7445215dc 0x33b245fba74dd91539806692d982a0e445c2e7c3 0xfb0bcf30836189005cf31c0eab02de776d5616e4 0x88a07b070c9af4d2a5a5b30b5594b0282ae2865c 0x0ebef3654f53001e72297bb42efebaec47bac3bb 0x240967b74bf15a6b7dfd089b5a8f6bacc30f726e 0x74c7e84d7718bedc140cf884aa44a4cec2112584 0xe858ec733d067633acd828c0aeb899a6395bab15 0x75c09f9d61379f9ed7f89220d7d7eac2534abc99 0x4efc52056392573d8e9f1c17e15fda747814903f 0x9914617fe897ce3d8d47d7449b563419bbce776e 0xefbb6048237c28bb11d5fb5f90dadcad3ef3f2f3 0x16ab6afde68a1ecc6f57c86e8c7ea5087efdd6ba 0xa8a1e5f1a6084636c1a7ece46230d8f06626be64 0x2c404953ef46482fdbdf7b11d182c5659865ee1e 0x076242418428df94dce27d9874576bcbd8bf3b2b