ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-E98B79645EA7
|
Infrastructure Scan
ADDRESS: 0xc7d8dec9cb121ec1b8c8b843122f548dce2bb484
DEPLOYED: 2026-04-26 00:27:35
LAST_TX: 2026-04-26 01:27:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Requesting storage slots for offset 0x00… [FETCH] Successfully retrieved runtime code from blockchain. [SCAN] Mapping internal logic flow and branching. [MEM] Tracking pointer 0xc5bdcdf9 in memory heap. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Mocking MSG.SENDER as 0x7afce9d2218a1effabc07cad492c54967eee418a. [TRACE] Execution path: 67% coverage. [VALID] Security status: DEEP_CORE scan finished. [DONE] Triada-Engine standby mode. Load: 7%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xcd662d5a624fe27598dcc18a5ba5beab6b14ed1d 0x82da23dd04c3051b58eadb05cea4ec14048334bc 0x05d60316bedf0ec58f984b532e3c618d8572b699 0x1c592c1b8a984eb38c5792e7cee2b034bd2cce99 0xdb20396fd58128f41684c0f2e604e1b5e4f0d998 0xfc375e51ceab7d893b0184215e99fe6273615b85 0x6dd9b79c0628a994b48f9cd2b08b8ada557c0bd8 0xd1eead55ccf13e143abca8a2a8709cae516ef6ae 0x50fcbf85d23af7c91f94842fecd83d16665d27ba 0xa7d8ad9480959c4535404b8b5f2f7556d7657849 0x47a3e569fd30fa9ce08554a79dc678acadb4bdd4 0x2fe24b2b1d15e56eabd701e8749d742965eacf51 0xbb90ae9b59add29cc8be564dd9b7ecd4c50695e8 0x249dedfbf5a4a296e0ee834f303e817ed3c12378 0x6e3d0888fac9e7cef5552f3bc2ad1f8d4ebb034c 0x4d52ca1c480b1124fa37efa3b3d2aa3efc100717 0x54911c15ff82d4b70f5c0ccfeee2838b34fc61a2 0xcb073168031d02ab8767e0dbba7ba1368d788630 0xcf4a3f6f08a18f9aa10e7d9246e981a2fa55036d 0x0d98797e23a6a01bd05fee63e2480e26d35daf8b