ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-BB4A6C9773D4
|
Infrastructure Scan
ADDRESS: 0xa433522e1435f68705e7e282302d44cb03fd3ee7
DEPLOYED: 2026-05-03 08:09:35
LAST_TX: 2026-05-03 08:43:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Latency: 54ms. Protocol: JSON-RPC 2.0. [FETCH] Metadata hash (IPFS): b0acc03d…baa04b51… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Virtual memory mapped: 0x0000 -> 0x07e8. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] State change detected in slot 0x34. [TRACE] Call sequence: c9a2 -> 2bc6 -> e811. [VALID] Security status: DEEP_CORE scan finished. [DONE] Log signature: e329ccf658765fa14ffa90b4b64f3e396750a9af2b854d82811cbe02d5504552.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x7b254ad67f2951930fb26f2c1f9b6ce2f2d2fa27 0x8a730da6d4f483917a53072d9a8e5eef4b105d72 0x9fbb2ce89998fc90d5c1fc735fa813e2431d0115 0x2ac74a362935b913d2b01de42bc9bb4828f88592 0xf9c5adcf7db0cab8897143df814bdbc9cbf13498 0x5e37150f4c287a33c1b54bf86f3128431f6abfcf 0xea0ba332b99d6c78be3960e224d2d2c1750e05b5 0x436ca57635f3430c79cbf2fc52e90c5cb4718877 0x3cf9a3567dd2872fd56a509574ba9ea9eb2a59c8 0x0f01e82ed86958f73a6ddb1c6e299b95516dc306 0xd8339c23363873f56be7001c500a55b656a99578 0xc330743dfc05f10cfb30f68a562bf74a0e38db48 0x5160bb9bec78709e6f18b00eac7aab2a98d530ff 0x2526076d5234d0b3418bd83039f50044b353efb0 0x4f6caeb5bdd6817a664ac8c53b9ad1f280ccab41 0x709bdae71cb5492cf64038d854ec4fd50a6ee512 0x149dc1521c62d357fc209c8574984f2cdc2ffcb8 0xbd76c4e8e6255ed742fe7b98dedc72e2e8af6d1e 0x08fdc223bc9e90947e02ec5db5faea8b381542f5 0x4f7bcab134917914866fcda6240d4d61ec71c784