ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-3FBD6BE879DF
|
Infrastructure Scan
ADDRESS: 0xa9351d37efc5523057d63c87bafb1a4e01a66f56
DEPLOYED: 2026-04-22 02:24:59
LAST_TX: 2026-04-24 14:52:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Fetching raw bytecode for 0xa9351d37efc5523057d63c87bafb1a4e01a66f56… [FETCH] Successfully retrieved runtime code from blockchain. [SCAN] Identifying function signatures (0xb42834e0). [MEM] Clearing temporary registers for deep-trace… [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Mocking MSG.SENDER as 0x2a9c35d4b3213c46251aa6be843ba9163ea05810. [TRACE] Program Counter (PC) synchronized at 7794. [VALID] No critical memory leaks during simulation. [DONE] Triada-Engine standby mode. Load: 4%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x926092b77113d0571cfbf7895efcfb2be0130cc3 0x742be499c7cf434896680de7b5d2e9a707da9713 0x75fdf9eb3e93a7853bd7aed2251cfb1ff8751a9c 0x3f537ef4313297b53bb827c02f3cc381ad080aeb 0xcac4e6d7e2cd01283a5443b204e4a369e0fb6b33 0x743a2102131bc4b153c2b3b6b366c11c1c5e0a8a 0x2569562123fb32147f0bed9804b7088d372cf9b0 0x4fc63f0746a52c443f5629a906738b931d791ed5 0xa7b164fb4e253ada3620e4e6cc71ea02ce7a5491 0xdcb6f1f9aa8dcbcdd98b149ecd80de622893b7ea 0x05d0b2b4fb4a71d5297a7353359839b8b6353be7 0xb3f8c6d7d83da78828d561d5b26c1a1ca09ff257 0x66bf182da24d03e1a75c5b5475c3fd0b5ffdb547 0xd7a6f7e6fe2fcc4e6dcc4d0221bde857e402802c 0x744a865c255684d924c83996695f59d85f92861c 0x95f6920ac5c6b452397d7b0eb370e6c605f1ef2f 0x14d44860f8477510d40787df4792018c10bf7cb8 0x4b4be2fa7facd55db1f4f2cb7a19fbc08b966398 0x96d5ee39ee89ae2e987a5c6846cd4845480f0a76 0x2d6bc7658d273b26a50cc19e557f10a366507308