ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-549D9565F5B2
|
Infrastructure Scan
ADDRESS: 0x4c3bdfe02d623183bed5c7c3d3e66e6e7cdab182
DEPLOYED: 2026-04-29 07:39:59
LAST_TX: 2026-04-29 08:19:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Fetching raw bytecode for 0x4c3bdfe02d623183bed5c7c3d3e66e6e7cdab182… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Analyzing visibility: 8 public, 8 private methods. [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Reverting transaction at PC: 4443… [TRACE] Call sequence: 3b63 -> 16a9 -> a7b4. [VALID] Comparing result with Triada-Security-Standard. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x42a30d0cfe93ea416d7ff08632fb082bb641aeb6 0x7ede7e310a339e716e01d8628404e1567773574c 0x4d8d831e980552a138f5ec9c54e0c9046672ee94 0x6407efa45fb767f594e1e966eccb621176c58b28 0x4e157626204ac54257f379c6c4895828b8616dcd 0x093a84f109e53e84d018bf2050fb322b4d80a98f 0xdd8c3a6401754cac1b149896cf76eb1b64db52af 0xfa71992b70d9ae7d563bd1a11ccc442f0426106c 0x09c686f0ed978b4a47f4a41da4cf32eb62410891 0xe7df08cdd442aff69fa391e655b57110e26af23f 0x25bd02bc182550968ef8fd8e7e358fb2c41ad06c 0x445af7252d07a5de81cb3faaefe30f3aef34bb1b 0x59df486a448369c385e1e976ec92c741a6462948 0x14fb3ab5d012ea47a329627bf05a0355f91e3c3c 0x34196697b3636a99518d80b2e660066c77b6b283 0x295976fdb084df947189cfb28d4260d6251f0447 0x478ce0554a87c5f9bd05d0fb975950105e16a8eb 0x90c3f80f4530ea5f2bb7cce513799423d21ab460 0xb2cc38c09ddaf4c8086ecbdf120edb57df562df7 0x7f596a7549dbf19dc26c6a612c7ffec886884241