ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-12EE6735C2BF
|
Infrastructure Scan
ADDRESS: 0x3b6808a95e65ed1550b79b669397c2b520179dac
DEPLOYED: 2026-05-14 20:04:35
LAST_TX: 2026-05-14 20:23:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Pulling contract state from Alchemy RPC… [FETCH] Metadata hash (IPFS): 0d3e3488…d626966d… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Stack depth: 9 / 1024. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Mocking MSG.SENDER as 0x069b97871afd6b99001c0bfe4bb524f50ebb5798. [TRACE] Execution path: 50% coverage. [VALID] No critical memory leaks during simulation. [DONE] Report exported to IPFS: 0d3e3488…d626966d.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x956a8af1d0b873cfa46f8d3b8ca70f6bc70e18fb 0x7eccc78e1fb7ee6bd5b0129b3b0e9f1415483c54 0xcb3168e89c375fbd0649067b63d5379232763499 0xe34ed25d472c41814eaa47fd8f17c9a10076ae81 0x760fae61e70cdcc9e2ca11c5edfea5a0a6b5994e 0x3159c4a7a32035e9735ec4c1bebb1b9f402d0938 0x1c9fbc4559c8ee56518623fe9c6bdc215ee5f192 0x6e0fdecc906528e17f4437bda9a119dffe4ab5e7 0xc9f49a959198d3291badb0bb92d5fe3defb87e6c 0xaa4bc451a35180abc28739259ddab1b881e42a4d 0xf60b5215c0d0817b94527e8da59182c6cee276c0 0xa31d0dbc871143b055df8da10b1987ce6316edd4 0x2c561233b115b513a48e82da7af90842a26101fe 0x93ccfca618b9aec470a94b5895814c2b02de9ebb 0x975e8600aca80ffe5026d3b6228580598d6738e4 0xa1a965cb517181b1a9630bc67ce9a4f6c16a2bda 0x93a3579a485501566de4963f16bb44dd14560010 0x7923fe64bc3f3db975bf0aa6ec525c892dc00407 0x084736771df29d99915c9ff5e781897a0eb6c532 0x1b0560f6659237c75eff569d6c7789dc6392dacc