ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-0AC56100CF66
|
Infrastructure Scan
ADDRESS: 0xc7778377d4715cc7afc24b770c42f8131a04ef34
DEPLOYED: 2026-05-08 14:51:11
LAST_TX: 2026-05-09 11:22:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Fetching raw bytecode for 0xc7778377d4715cc7afc24b770c42f8131a04ef34… [FETCH] Metadata hash (IPFS): ca439a89…a92d62c8… [SCAN] Running static analysis on JUMP instructions… [MEM] Clearing temporary registers for deep-trace… [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] No critical memory leaks during simulation. [DONE] Report exported to IPFS: ca439a89…a92d62c8.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xbd2c296d3ff7d5e0ac10bfd58a5e348d18d2f82d 0x53387e3662191ae36de757234418e5799d1747f7 0xf4a3ece77ec589a2d339a72ac3b65db0d12d81dd 0x8b07f1a5a1b47ef1ba44565d9237edbb25c6c2a5 0xd753c2b09d4c7a2355a1f7809d1bc9daa421dc18 0xb66c5c822a04f6961bde4d195ec7c531801fbb3f 0xb475e98ad7c61fd013653182dcca912b92814a81 0x6a6b5267ed2fce3f2b2af6d9184b064cb8cc22c3 0x36fae8f200bbaa59e29b011868921f801452cd3b 0x4564035522c0c8d27c714e965d2a497b12f47181 0x94d5793e578500295697e1e76f833c7faa428924 0x8119bd3f16a7a2d6874fda5e1e650e755f6e23c6 0x0eda9912860bce700a6773539e6f03303c7d44fc 0xeca605e20a80a9fa0aa86b773a22d973a68b0136 0x72a422b917736e17451ad7bb4fe93e6148eaa824 0x6cdd218543068ffdc6b764bd6a3e110ca0ade789 0x2037d673885f0bff8c29cad2d5cb4807a001283b 0x5106f91177b0db50dd1fa163bed5a0923d8d7f16 0x44e633fb847461145141031c8b5f9942fe474a29 0x716f50a70b1a130770801db11ae1ec6365bae528
