ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-2C933B080CCF
|
Infrastructure Scan
ADDRESS: 0xa8adb16e6af5eeeb0aa6ac5fb638cb610de80c7a
DEPLOYED: 2026-04-28 06:55:35
LAST_TX: 2026-04-28 12:28:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Handshake with node 0x1839fb7a successful. [FETCH] Loading bytecode into isolated sandbox… [SCAN] Running static analysis on JUMP instructions… [MEM] Virtual memory mapped: 0x0000 -> 0x23db. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Mocking MSG.SENDER as 0xcbe9dd441a9065336c7b3709b2736a913ca4ab9b. [TRACE] Bytecode segment 0xcf analysed. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Disconnecting from Ethereum node…
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xc1807ac82f076303b60bd52bb4fb896f9f6afd58 0x07e94a82c2da6be1e0675eb4bbcf3a7b15378027 0x5b5dffe6d2ad97c1b514bfa5fd776fc1d5e6534a 0x066020fc68ecc2fb225eaf1af765127fdf60a496 0x2664db39f69278004588e49a2a85a45290a24c3e 0xfdece90211520a3e41d8dc80171e692ae396c0c6 0xc0b2fa699bddb7695038ba41b2093e9fa17ba147 0x814ad0e8de32ad0b2391ca699502c307f0dc49a6 0x0b748a774f9888c65f651b6cf16b5ff7c104b717 0x985ab0f64f8420c0cee88bff74e06a46f37c7fd1 0x0260c13f07811de60176b01a947d8498315b51de 0x118eeec4638b59aeefbf2a8c1f0be1a2bec3defa 0x7ac2ca6eb8b7c71692b490b7e227c43efc307e2e 0xf79a1af15477fdd9ca9dade061a855fb67480402 0x9eb03a00aed8955723eb5d1ac68f411ac6481150 0x8909dcaa8b12ab135f46c47d5fbabec943dd7e89 0x890bbebaa9ed82136edfa2964bd82869faeb2c3e 0x2d1d537a02654fb6d7d852b06d06f439e3f40c5b 0x8ed676c5adfd6894dd74cc608faeeda8cec55209 0xde0ee94408ed04c1a604c52408fd59db934e63b1