ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-5DE68EAB6738
|
Infrastructure Scan
ADDRESS: 0xd147dd805a0cfebf6fcfef460e0c4c716320ad47
DEPLOYED: 2026-05-08 22:08:11
LAST_TX: 2026-05-09 00:03:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Pulling contract state from Alchemy RPC… [FETCH] Received 88 segments of contract data. [SCAN] Checking ‘immutable’ variables and constants… [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Fuzzing input data for 69 iterations. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Comparing result with Triada-Security-Standard. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x2c3334b016dbe41992fa463907ba9d3e972e5ed3 0x0ce12d73786ad0692985d35f3d70bada7fd0defc 0xcbf529b9cc942dc7ca028490d73b1a804c4dadbf 0xa47dbc1c4d8494af6e5c02b9a8bed3ce371a60c5 0x96a389ff86cd047c85ce45916e6bae5f23727cd5 0x56f744934414a6033153a80fae3e2ef494a7e549 0xd5f6a2c3f85ea742023ea2a7d13c4b3b866d2de3 0x51dce889ade451751a193156a75ff3923b99a9e4 0x526da493d925cac4f8617e410dc315b000521112 0x9776a080a18e762e6fa533c538b4fe5695c747e2 0x190dbaab44ebb46e2eaec5b74514e810d40a6cb8 0xd091b2e117fa5553af3ac44f5f10310514153753 0x92a9a20631bd5c82d5dfad50fdc5c44d281abdaa 0x5d6bfeddbdf563c2902e093216e4ed4a7dc0c00b 0xb81a67b20d4bee3c704cce4837bb7a7989dc2bab 0xcc8f111a62e2769188975e8e28726c3ca94beceb 0x29f4bd7abec327363d3a64225b831cbe9196d176 0xfdf9eb48afe773626231ff9d0edda0112dc88a12 0xfcb6a929db98a1d69b5f33a2f7e073cb7449cf30 0xe774338daec01a03804b45fc177404f94cbd8c9d
