ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-3EE38947559D
|
Infrastructure Scan
ADDRESS: 0x77b732ee0134bf5c05e86d173f952e43c71d915e
DEPLOYED: 2026-05-10 03:03:59
LAST_TX: 2026-05-10 23:51:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Connection established. Peer count: 88. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Snapshotting EVM state before execution… [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Mocking MSG.SENDER as 0xc634847b8b07a804c62cbcc9389fae6d76b31a17. [TRACE] Program Counter (PC) synchronized at 2133. [VALID] Gas optimization score: 88/100. [DONE] Report exported to IPFS: 0573aa1a…4e8f5d0c.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x0d48fc99cf12ac72c6462353416b895d826ea83b 0x4d4cbde79bdbbd72b5bb6052b0c69f1d0a868ea0 0x2858d0b0ed969108d8c56a83ae3595ca9e9dfac9 0xf0f41a33667684f34fee84b49e604326d9fb7976 0x108daf65faabc3fc7745ac5baaffe43b95b138b2 0x226f697c217826efd490ab4e008d734b017d0615 0x04f392c4daeff3a1ab85ff1b202bb1218506863e 0x20f3613e773f5ad0aef2da7205febd73c25d1743 0xa1dc1463db6939675836ad6012c17dd7c7625aa2 0x29e3d74a6c55535891cbc7ad2f01f3853f2bde56 0xdb788cf1a2d572bcc6e1a68ae0ee1552b73b7804 0xf044dda941c610cfc0c29f74676bb862484d471e 0x71dd7ac6d9d39870d1049f348b775e472f02efd0 0x095fa6a14dc6a30f3432c3227b8290b1dd3cae35 0x324315d5242d1fe10951b4e96ae2c1a88affda02 0x2290002e3c4c586d4bde4a488496c9eb1f6c0671 0xf72887aa41c3ca9425a2a0a6df6abbb2b4d6a156 0xbb1e19150a6b5127dce14cee2b801b55b7300b2b 0x58a167a94365b6294900a1e2a4229807dcbcdc09 0xdc937d5a2d0e1c5406f4e0a9085336ed42bacb2b
