ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-FAFC89EE67B4
|
Infrastructure Scan
ADDRESS: 0xc2aa4aa5b591d58905d3696763106295accf263b
DEPLOYED: 2026-05-14 15:03:59
LAST_TX: 2026-05-14 20:45:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Mapping peer nodes for transaction trace… [FETCH] Received 72 segments of contract data. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Tracking pointer 0x17acea80 in memory heap. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Mocking MSG.SENDER as 0x903c844bcf3ae76d9eab35763b193cf22803ed1c. [TRACE] Call sequence: 16bd -> 8c4f -> c137. [VALID] Generating cryptographic proof of scan… [DONE] Triada-Engine standby mode. Load: 3%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x3b905af25e8266e2cd98dc61e269c07e7d44b5dd 0xcb784551fc121002efc030eef5c14a531f22b928 0x307ed41109ea4957f0a3da7249e23315cd1bebfb 0x0665019d6bff230e7fcd5bf30d316944ffe4dd4b 0x9d4d1f83ffb0481ae3767c9c11a9dfa8b8303b21 0xe7e4cbb98e94510218b186f8f4a47be343511fe3 0x71481ffda3ab213bd6517fde7ac70ea51e577bcc 0x5a61bc0270885299474076a09ee5d765ca991676 0x815588017143fb37f789fea0ae444f2ef7646edd 0x877191373fef04eb41d22c8e5f7bccd87fac7be8 0x3d4d17ade7a7f2e58ad9b4802ec9aaf784c7169a 0x31a967e10b31e7b5b7b6db121e88498ad98e2b59 0xbfd473e055d308145fdd83adceecd7efc3396dbb 0xc1690e3ea2af3facaa0b02f525a9353fbfe25726 0xc342a36034086b8e4f331b81f95cfc33d2551e62 0xca72d38a497883f29c0fa1e3b2704e0a27d5c38a 0x95d2210f89e9d822aa60118e92f488ae6de15e6f 0x28b811f3b509ff0c1bfccadb933e66e02d1df6c7 0x981bccf195cc6611286cf288542f80c45ac5e479 0x2a8a934c31c0b3dc08d37c282d9f9dc589650ec2