ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-CD773B8246F7
|
Infrastructure Scan
ADDRESS: 0x200a9bcf098d04ecfa012d7133c2e5561e56e54e
DEPLOYED: 2026-05-01 00:25:23
LAST_TX: 2026-05-05 08:59:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Mapping peer nodes for transaction trace… [FETCH] Reconstructing ABI from function selectors… [SCAN] Analyzing visibility: 2 public, 4 private methods. [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Mocking MSG.SENDER as 0xeafbdc6197445b6478b57d732540885ee78f52c2. [TRACE] Bytecode segment 0x75 analysed. [VALID] Data integrity: SHA256 verified. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xdae5acda10964019b820d6401b217d37afd3c4cd 0xf5f356e3e2a5128d3b8dc3105a5b018da74b5bc7 0x03dafa86f5db828b535e3d2739c5192c1d89709b 0xf85699c6a22c40d8d38129657920b0852738318c 0x6265fd688e391ff754777e3dc744752c4bfaff1f 0x6761141d3e95c4df0d9edf931536597f4936e6dc 0xa33e3f92869584763a0dd53d948fcce803e4a386 0x4dbd65cd43c2d86df038a925b34ce9d5b39d69bf 0xaef031c632c85e2c0dcf38f760d4821a1d6f7502 0x8145da990f21b4ece468230e8249cd7ea7756340 0x0e3c3e4fed71c6a3a6509157da653a4e1e7432d9 0x4a0cdd0ed6d9c486bec0abbe169b6a13a5b4986d 0x8556fb35b8b6ecfc8add3f0102dc7f6475cc39ce 0x304337a91ac3cf33e31744882812ef54a3099246 0x4783cdc564b9b9e42cb428949cd4693e4b26e389 0xf75d38c57d29847e43ce8491cb3c6ecc14761cb6 0x5bf739618ea50a65d432232e405d4a4381794017 0x644ba8db7f7f682cb5527e54791cc1ae9ef1afc2 0x6b7463ea49396a6df507503d1ee28d016ed7c874 0x8a413a3f81c1bb941659932343eedbe02383f7af