ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-B5743E5BC6E4
|
Infrastructure Scan
ADDRESS: 0x520aa3343350e5897af2205432cf137550b983f0
DEPLOYED: 2026-05-13 23:41:11
LAST_TX: 2026-05-14 01:01:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Fetching raw bytecode for 0x520aa3343350e5897af2205432cf137550b983f0… [FETCH] Entry point found at offset 0x8292. [SCAN] Running static analysis on JUMP instructions… [MEM] Tracking pointer 0xd97c8cb9 in memory heap. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Reverting transaction at PC: 4743… [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Security status: DEEP_CORE scan finished. [DONE] Triada-Engine standby mode. Load: 8%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x52931ac44ef91d79b62d655ce0a6d54681c3d4a4 0xd35eb06a3f7b78ee74762ce3c8e7004f8651efcc 0x9fe2872fb3e7cf8028f7f2eb0397566a7088c06f 0xe6c7a61b3d9bbbb803be78e48e6f07b630a39232 0x70b7f2ef3dcd37a300c8eff3a2c3f5f1f21c1ff1 0x4a7869258dec3febddbc14edb2ab44cbc4bbfbe3 0xfc2260da61540d807557b2fd516d4172c4ec27b5 0x24124d8a4e37898e1e8d91450c43cff1c5e4c1ef 0xd7299f97fccc70e0fab0d10a69af4f4f89e73a37 0x7958de7d8c857cdd37465fb920a961b1f8f74301 0xd25478e68275886a912dd5e818e431fa41dec1ee 0xbace101944f87541c95af3ef6a6848ce3553f17a 0x776bc5c305aa6af5dc8925e6984819a38f8fb6bf 0x7c18485c4b9b4b0419686c5e97c6fce4e36d760b 0x3cd39ea9e5cc636256c151ec1da168d1a2ef0724 0x1470ad9abf379d1854fd01a8570aed287f4a9bbf 0x76171987fc3d994ccd9fa8b73d0f3b03c2f1bb7d 0x337c8be583f71f5cef6ecb5d63d3c602922bdc5e 0xec095c790f29eb67e92e69465e6344c9b24c1444 0xcc25e50c8697a3f33a29516967706a904cab5003