ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-4450088CC0DA
|
Infrastructure Scan
ADDRESS: 0xa52e7d361d64987eeef9091d43b0c2ff0278a93f
DEPLOYED: 2026-05-02 18:47:59
LAST_TX: 2026-05-06 18:55:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connection established. Peer count: 47. [FETCH] Received 28 segments of contract data. [SCAN] Analyzing visibility: 5 public, 9 private methods. [MEM] Stack depth: 5 / 1024. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Testing edge case: Zero-address transfer… [TRACE] Call sequence: 1421 -> 53ab -> a93e. [VALID] Consensus reached on node cluster: 2/10. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xa9cd6842870c3d67760f76d6e7bdd227321f3e47 0xdd812bd9c4f7324a3b20b884eebdd0eb2e2dcc5a 0xdd93c42a506dcbc4069aa9a429a4d91d4a40e8c2 0xa2f3ac3745e6c813f5bbd3d5c8b29b894e952f04 0xdd80efb45ea3cfd38272379f743927bf0519d2dc 0x355c4e26a4dbc5f353146c02303f7f4b0f9820f2 0xe5db67ab242acf5547604f9725395803e6a69446 0xddaa00f9fe3b3b8d8c3608a37437dcf43d428a98 0x5cbc5a0e6baca014a87d840a8a7ecb2b27a050bb 0x69f763012795cd0af0e664e0adfb0bcf79ad4491 0x1a42310095539b638aae5782d173d9973ff25ec9 0x207e91a62205c66b57708be4952fbf9449baf6d5 0x1760618972f2f9cad4a78ee464ca917737aae2da 0x103d4ef6e7d87ea27355b402a4ae0875c3fb32a1 0x825815c68134b405be4d1ba8263c50618c08fe5d 0x775bf858f87b7f975e7c163340bc0fe0184d0fb0 0xd644841aa2a6c7916666364d3db34180ac2c0fbb 0x005356745f10d80e3c0874b8c0ee7574b81763d5 0x9cb69c0d830a10276bccd5d4e6bfe967c2cbf6f4 0x0b701ae1480526deb7dfe7a2a9bd7b2d49e447c0

