ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-7E7D005E0A45
|
Infrastructure Scan
ADDRESS: 0xdcd7ff5adeb8046a8cebe121f0c009be7b206658
DEPLOYED: 2026-04-28 06:09:47
LAST_TX: 2026-04-30 12:35:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT
EXPOSURE: Legacy_Testing_Interface
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately!
|
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Fetching raw bytecode for 0xdcd7ff5adeb8046a8cebe121f0c009be7b206658… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Checking ‘immutable’ variables and constants… [MEM] Simulation buffer: 1024 KB allocated. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Reverting transaction at PC: 7959… [TRACE] Debug: 0698b0650ee9a75b. [VALID] Signature verification: 0x241136532e8ab4524de90a8c030b0669da157c5bb6bfc4024a8dd28622f8ac9c. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xc07f940c6ce1e8f0634d1e28a1e40d7826d50965 0x18fde8681fba315c69486fc73b6f61f38a5a6073 0x507d3979402fcc6cc59194901ec5bc7f19281c18 0x5cf6af6db592a659659a2274fc61867bb8768b7f 0xee0c912f10665136f8d9617717db5eaf102abdca 0xf1f7f1005109462262fac34c82df616b14ed19d8 0xf4cbc849453d64e8776862033a71e87313df906a 0xaecdcfe3e7c142df07f6a5547d6aaf19901854e7 0xa5c323006b6916f45613e17e23d896a6437e47a8 0x5ee923559ee06c183164c3ea1f5569384d36a26d 0x36fe40cf2d59ca687799bd7c2c3bcff3451f2e43 0xca6f67ae992cd6440fdfc36d7770ccf1045700fe 0x6fa1c847efa340ba1a16bf10295300bbaaacedef 0x8d1bb8c9142769ead39b7dae58dba063d4ff1786 0x05ede4344567e54ae3041187b4280c8a7e101af3 0xe5d7649b7454ab136cdad48c4214e69a1ff53e16 0x33bbbe5123bf9f4429618ec29b3ef96b81d23d39 0xb0908151d5f71aa6d8277eb3adc4b7e2d5ece44e 0x1ea6142344b2730f4c6ac01dbcaad6ef48dc01e8 0xa9e916ce29fbae83889e3647c9274202249b2946