ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-0E5AF013DAB9
|
Infrastructure Scan
ADDRESS: 0xa0d872865f9a01ba68170b29b8afc6f06cc22a15
DEPLOYED: 2026-04-25 10:26:47
LAST_TX: 2026-04-25 10:46:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Pulling contract state from Alchemy RPC… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Stack depth: 1 / 1024. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Mocking MSG.SENDER as 0x516f662867aa4e580cbcc8434100a1ad5acbefbd. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Generating cryptographic proof of scan… [DONE] Log signature: 52e256be4acba29eb669fa0b846cab8c8a14810ebc5d0c46dcaa15ebee16e135.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x863c2001ae5c6ce86d036de6c4356bf08bcf8a19 0x23c231ff6e71ba2321693c70fa58c6cf44dd33cb 0xd73f389387a9188204515daaae5864a87d69ebbd 0x6741baf9c267f2d35f2025b5d3bad4ebf32f3902 0x5fd06ef5183f431405e36b2db26b08d4b404e886 0xd7509b8e6d243d9d285c3953f9c4a0d876b53dcd 0x011db9c098d6af6a087c389ad91bf9eefe442c34 0x7b6d44e248bf2803c70f3587a48ec1895789d389 0x44d6866348cf0a9d7228dd6ea1562d982a32c499 0x72048db199d44da6cd71e862b92c2d156cdee20a 0x7bb5d04a2081bcd0cadac5849542294f2928c3c5 0x70b66190bd139e97ff894d6a3a4c285e17f1d2c3 0xbdddd25cb5566ee5f9a1e7e5089bda8bedf70c92 0x885d09889918ed667735d147cdfdf8b39744d906 0x19e2b898d508b21a606c4d04d96d426c3ca40543 0x30000608c27d5b267cd5cc61358bfd100cad701f 0x4f0f218b813d96527b3e3e925f9449b9bd28afbf 0xf58163ff379afb8072674d73c114743705f71128 0xdbbaf661e5be143f0c5e3fb7db200144944866a0 0x51e9e5c4fcaaaf5e2bd57352973d65261ad97808
