ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-78644CA70BE7
|
Infrastructure Scan
ADDRESS: 0x894e3f1ca45f9404a8563b09aec7f24fe24c9461
DEPLOYED: 2026-05-17 06:03:47
LAST_TX: 2026-05-17 08:15:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Pulling contract state from Alchemy RPC… [FETCH] Successfully retrieved runtime code from blockchain. [SCAN] Identifying function signatures (0x4fc6cdac). [MEM] Allocating stack frame for EVM simulation… [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Mocking MSG.SENDER as 0xa154faa78062f51355919bc580655a1367aeab54. [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Data integrity: SHA256 verified. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x05c1e6a9ee0e3178457a15e7419ad1cd4a10e96c 0xcf8587228949c83e24c0e0864a35920c629c9792 0x551b9c71cc1bbcbc483c91c54f1448913661983c 0x41839b8e72027645f427d184e853ce536436dd10 0xe1ad4bb11b6801159b54111a19e1836355cb717a 0xb776bfea1e177ea60d12ab2a870872e12a3e3b90 0x72088eb009d1d55d1286fea3bd755c4712967086 0x3a111ee49732da8a261ad47aedca91c5899e066e 0x7c56d119a916da6593e1fd8c1d010161f20afd70 0xbe1f5ae9fb324c244640e86e96e2ce8ef3da2bf5 0x719de6822c00a69db214cb4d73b59ac1e1ca6c09 0xe9703f6be9dcd4edca081f7d88e3e38248f2c535 0x24ea757fcf6190f615ef0d660e3df1113d0ed013 0x7b3fc11c6d6ec005229a7cfd399c20fe8c1d5ffd 0x4c457084aeed4c37a5af59b6b28ac51de19fdd66 0x9088a7b9a4d07cebdd7771a0b0f154ac3452ace4 0x8c581e2dcf50b1c8421760a5e5969b96ca2e97f5 0x493ccd8a90c70d3d49da6052731b594cdbc7a37f 0xc8ecf054df1510063261a4cd17ed0c8266dde634 0xed958c5d2666fad03624fb774013a36bd2ff010d