ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-03B09C954401
|
Infrastructure Scan
ADDRESS: 0xcf24e99e8706ff84f90e92e73ad644a1e17beb45
DEPLOYED: 2026-05-01 05:33:47
LAST_TX: 2026-05-01 23:14:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Analyzing visibility: 6 public, 1 private methods. [MEM] Stack depth: 6 / 1024. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Simulation completed. No state corruption detected. [TRACE] Call sequence: e10c -> c023 -> 8480. [VALID] Comparing result with Triada-Security-Standard. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xb212240c5b500e6269b85ca170db939c39c0c00b 0x55dd97daa30190f2f501eb1dd109186b8db873af 0xd56e2febd99db138fb87d42c966b12b92aecf4bf 0x6caa1627e419ab79efdabddb1f58d9258dff7f28 0x4f19732f037e43f94c37cf707f1c7ae07c40e0f9 0xd60cbfd3c244c807d91fc2b621cacecac8ea1dfe 0xc9518472f04d898169850e7eb9cc59bd2911731f 0x8c6ff00a6aff1644cb36fafdd5664fd359864268 0x19c4efeadb856d13b6b4de8e6c783506807b6777 0xa62755a7460590f78fa7038027cf17f73f4dc1cd 0xb9210f37b03db68ae04f579d841cf9a40b98e21c 0x06c08d67f3eec0cf3747aff6bc0dbf16308cd6d7 0xd546e3da4ee35da37ea316dc1dbd3ef610285435 0xce1b4fad19edb0672cff84ec284b7c72d1bfc359 0x0135d915662e8a175169b41c6162c44cc5f325b4 0x35be865e5d67679da8be0fea54d7e1b794ad51d1 0xaeafe981107348a42bf2b3d2ab1316f518b36b91 0xb8a1f0a28ba859a26d0f36bd15fe9a6d2e1f0595 0x470b5d0111634cc276f5ed6dc17dd072329953e2 0x0a5d4bd35468d6475d456673bc85f07331662bed