ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-41D63BDCD687
|
Infrastructure Scan
ADDRESS: 0x351402d93ad6744587c05f641f47426e99ab03a7
DEPLOYED: 2026-04-29 19:47:47
LAST_TX: 2026-05-04 22:10:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Metadata hash (IPFS): 449d1509…5a9fccb2… [SCAN] Running static analysis on JUMP instructions… [MEM] Allocating stack frame for EVM simulation… [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Simulation completed. No state corruption detected. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Triada-Engine standby mode. Load: 6%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x51dce889ade451751a193156a75ff3923b99a9e4 0x654ea6debccae4c79d0ceafabf8fd02f316a2a91 0x57787fef63dfbf688c1043312c1d8076191bc55b 0x10d093dd6362245a81e770798f1721846a3ea47d 0x614439e5f4ca118a65c7b87faffd3f95cd783c5a 0xb12c70821d2ec5b003228f6dee609d7f224cb35b 0xf65392a5f42d17d9781d026dae492b0d95059003 0xf9441fac0dbaae55c20c13283230b6b46c5b272c 0x3772023b19bed55e7230b02b29dc9693c2cbfe00 0xc819917647d11edc2ef6791ea05d06e2718b2a35 0xe1cf5398064fce032be5076bac15e53ef33d7530 0x00b3eac531079299b1b62129c827f4105049c538 0x8f493a96676a9c4050fd7d4be43af53ec205ff23 0x5b094ea56d478dad0064cdd7de086405dddbf7f4 0x542f003393939bcd1a01509cd4d52f05ea224ad0 0xeb964e87d254f2c692ade3193cd463e69ccba9e6 0x738da6c4fba026baa3eaf97083626a1649e3e48b 0x2fc59a4be1c25733a37a5c975fe7981872b6c079 0x7d6a2ee704b2d59c7a398480b0734039f6eb2442 0x3f2071d6f365a1040158c0afbdfd9e64baad67a7
