ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-66CA6DC332B7
|
Infrastructure Scan
ADDRESS: 0x0be45e75797155078417d1a0c32c8b8926403c87
DEPLOYED: 2026-04-28 09:52:47
LAST_TX: 2026-05-01 08:05:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Fetching raw bytecode for 0x0be45e75797155078417d1a0c32c8b8926403c87… [FETCH] Bytecode size: 7604 bytes. [SCAN] Analyzing visibility: 2 public, 8 private methods. [MEM] Virtual memory mapped: 0x0000 -> 0x8b8d. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] State change detected in slot 0x48. [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Signature verification: 0x9a580c95f302a234b3d0577dba76f34729e9baf614c778960471db102799c948. [DONE] Triada-Engine standby mode. Load: 3%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xcb08f3db34c8ec7780d6bb60a77eac49244b8538 0x10e082791fa25dbffe24cc74dab130efd05584e2 0x2e00d99f4fb606e825b256227016162b4f662287 0xf32f044a761e35a51df03d80277fc7a90f804578 0x09578f261620a20202eb31e0697f8e26913a64e9 0x9c51a3cb5094b26aa1dcb380f3dc7e1a7c681c2d 0x786894c761b271b8fa4661a6b587060105d4c7da 0x898a798dbcf143af0d6b411848e1c0790a36dc82 0x328b8a0292b2d6742bc26f9d6ffc8bbdeedd089e 0x5572d93bb5c5b0a88df02f3e2ff9ea9a47a43df6 0xb9f0ed27a6aba5eb65dcb0b28b8bbf1bf9fb9248 0x55b7f1a2e6a9e006ade356a9eff7a2131102bb89 0x8dd969bda43cb75c0c03c0a31ea2dfc27e8ae3be 0x06ba66ad72d0b12ceedd746aa6d0a6149e080c37 0x1eaebe704bfc1bfb9cb046ab6f8b0527cf749317 0x26cd93611db31911e2367e68c3ee546249d76fd3 0xa08d3400f012bdd2208246e6e355907286d57521 0x0fd81358fba71ea175b86385400dcf89d8341652 0x9cb69c0d830a10276bccd5d4e6bfe967c2cbf6f4 0x5cb87ab594aeed2888b94ad57eaf22d92420872c