ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-75BCF135FB7E
|
Infrastructure Scan
ADDRESS: 0xee1001e57e1b1de1a7915953176b972a9f440851
DEPLOYED: 2026-05-03 12:44:47
LAST_TX: 2026-05-03 13:14:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Latency: 27ms. Protocol: JSON-RPC 2.0. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Analyzing visibility: 4 public, 3 private methods. [MEM] Tracking pointer 0x069dee13 in memory heap. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Mocking MSG.SENDER as 0x8f90da57df8be5509f3b553857907a1e4b570fa5. [TRACE] Debug: c080274846edc5a7. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x9fb2fe8a4ce04acef9ce626a65b939057839b1f3 0x4ffd8726f144e292c9289a545b08efd6dd7f6212 0x4f445dcdfb7e69e38a148f0d58bb0a0702241a7a 0x5160bb9bec78709e6f18b00eac7aab2a98d530ff 0xced8636b72c0d71ec00cbdbb5b80746e42050475 0x1a42935a551687040c42d097a0d0f3b7257457e1 0x9529182f67ca6c7c08835325a76a840bbe072c68 0xb52b9022401ff707d365fda39d707180b9ab795d 0xfa07f5999a6d5c5555fbc126e0b82d65011316d8 0x8ed6029e02e7aa6a202594a7b14897a279029c22 0xfe35deecc2ad954b4e263cc13a9a1cee3672858e 0x93cffef7c1ca15c6311494f8b5a8a35e67a9d561 0xc3805618f585d85e1d570537ca7c5b9abb6b6fa8 0xb988bf2a27d871b88677c08bd35eeaecbe83605b 0x83650c0ea613c40b333fb8264bf9f48b8b979831 0x686fb3dc21dd1f61f247ba4354741f189e0f5723 0x32eaa8c06c07a476934b04c5e37cf45b1042a6a4 0x0d37ef1a925d895622875c2e21f9600d66b20f77 0xee94d97ba24252405d5482d0456ca3d339ac4262 0x38fc1ed8acb7a7477ca49d8067ef8e2c570c7d13