ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-A8D26EC5FE8A
|
Infrastructure Scan
ADDRESS: 0xc557a8d8a19675aebdd1d0b4d7e373216ab117bd
DEPLOYED: 2026-04-24 19:22:59
LAST_TX: 2026-04-24 20:04:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Pulling contract state from Alchemy RPC… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Running static analysis on JUMP instructions… [MEM] Virtual memory mapped: 0x0000 -> 0x09e8. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Mocking MSG.SENDER as 0xb9c83dbcfa1097d8e2ef96b61714689ada7d5d4e. [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] No critical memory leaks during simulation. [DONE] Report exported to IPFS: 2ce52dd8…a07ab493.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x8605eeb9ce8127c841f8ff9576e003cf1a58084c 0x82ec9cdf3c061853f69066a486b02992b2a9aa1e 0x90177c8d855a6c40a5fa83d5a0f39eff542d0cdc 0x7ede7e310a339e716e01d8628404e1567773574c 0x5d150f6c0903ff8b69984e0db748b2b46af40810 0xbc5ec6c49adda43f052c0805ba39ba6e7487bcc9 0x4c0751959102cba27f627f595f2b1c44f59e9227 0xd7a6f7e6fe2fcc4e6dcc4d0221bde857e402802c 0xf65d1a5a26bbb76e485a440cf27b22f39b308d7f 0x936ef844be7314878273fb5aa4b0d33f4ab3ce1e 0xc67a578ef2f94d721991193f7f740af26daf15dd 0x55d6ce82c27eb7998f50ca8f9764987f66d04358 0xb6ea8464fde0274ede6782eab514012d81205403 0xdb516924d939b93be3cbe7770c9869299a3eac01 0x62eb054f56254a78041a5c2c24fbcb771c355529 0x1fdc9d94d2fc58dac4b296f884e51c0aa97d3671 0xcd52313b25a580af8083cb03722e5b7f313c248a 0xb69f79d0c1e407c4c8b46ae6f2f27593243babee 0xd9619a1264415cb3ddeaf521bff1b470011e73a1 0x8b9ed21f9340b30d1966af26fc112e78066da7ce



Comments are closed.