ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-DA22C697579E
|
Infrastructure Scan
ADDRESS: 0xd7d374078e2ecb82ae58111c73ffbb77c1b02968
DEPLOYED: 2026-05-14 01:05:23
LAST_TX: 2026-05-14 17:50:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Connection established. Peer count: 51. [FETCH] Loading bytecode into isolated sandbox… [SCAN] Mapping internal logic flow and branching. [MEM] Tracking pointer 0x96a05e6a in memory heap. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Reverting transaction at PC: 5293… [TRACE] Execution path: 13% coverage. [VALID] Comparing result with Triada-Security-Standard. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x88927d23aec002f384b3e69f184a9a5955d487d0 0x527d423f0609ee93604a3cf10b81ca147aec5c5d 0x0b611971ae952770abfcd20fd6e91029f9bad063 0x55615d7567bf4f425434afac497d82135e65f1dc 0x393aa5086466db871d8ecb32c76edaf810aae11b 0x6f064aebe838c423a86b213ba80bdf6ed11320b0 0x25fa9c74a6007838fa3c069d72a87715962ab402 0xe4f0acf04e9ad7229d25061ca5218cd753a521e6 0x6941eff68ee2f20de93347f799da8881a9f8b215 0x4ad7651b917f0274583b9f2d2a25933584e7a89f 0xe3d9b1ae7480abf3af6f68f3b84c5b702bd78785 0x8d289cdd60e7f73f352f42c8524a06ef1ad746f8 0x7dd82b78e6b64fda32bdf6e98a085f6bf9d8e52e 0x598c3dd704d1d356ac07f09d009f84f65e033146 0xc6671d71f1ce9aabd95359bf6f1ff354ec3cfab2 0x4f6567c6be3cbd4daadc62b86a77225c106c31cb 0xf2588722a0f951c91634a5755bd0a6febc6569bc 0x61e6556d640772540c4580b9c8063d23cb79294d 0x00f649e515fbec53b4a0a0554ae3363603153ecf 0x8c0767ebf391baf84399f757de31d57d1c6e337a
0 comentário