ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-657B0C45AF9C
|
Infrastructure Scan
ADDRESS: 0x6e3668fd5d8bf4bb15d8f4bab657c315d868850f
DEPLOYED: 2026-04-25 07:46:47
LAST_TX: 2026-05-01 02:25:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: DB99AE85. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Reconstructing ABI from function selectors… [SCAN] Running static analysis on JUMP instructions… [MEM] Virtual memory mapped: 0x0000 -> 0x2c4a. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Mocking MSG.SENDER as 0xd856cec17ca12df2cbed8047df73d83c66e7e859. [TRACE] Stack trace saved to /logs/TRD-63A8EAFC.log. [VALID] Generating cryptographic proof of scan… [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x0e67374a45a795339d572a356eec05eec7d76ef8 0xbd0f669ad979aecfe5911ddf53b2ed22d9a36a10 0x7adf0c4465ab5e79fa122f0c1eff6caa1db17310 0x82ce39d94fb2806f72064e37f5d208e24d13a949 0xbab292814993847d8aad1f725daf2ecb764ea45b 0xc4da820c2d5feb58588f566bc0bd01be1600b624 0xab42214392ebcd4bc19103883e4f4d060eb89504 0x3e374b55329a4ebc35d48e3c9450e92c704edfe5 0x6a548f7fff2a7251c5a819aa55960d0c995e3ba1 0x5c6a1d40af115260a12312584f0e5c5be088eee9 0x9c7fd103cb6cf032544374adadf45b9e5b5d06c7 0xed96b6f905b1032a3dff02c7b8eb44e191344c19 0x45322b08891f3fbfdf3a9595babff06e63af7ac8 0xd2910dd390ed2405a726f49ba33b1011125feb14 0x387d7b75e0f6cba9bfe358c83e775bff19c94fae 0xe3c36bb5696e12cc818e698edff167271f6d6d79 0x160960fe96d3d61d606c4ce5d39d0bb63758303a 0x8afc75b2beb24e119640503360f405fdf4237068 0x6f3c79655d0a782c6c2964128fe7ca267163c9a5 0xe17e583b43b0639a6fa78da84d5d7d4bfb45dd1f