ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-A367DB110B11
|
Infrastructure Scan
ADDRESS: 0x35fff01e251af3bfabaeecbe41e0c1418f4cb2f4
DEPLOYED: 2026-05-13 03:46:23
LAST_TX: 2026-05-14 09:34:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Mapping peer nodes for transaction trace… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Mapping ownership-protected functions… [MEM] Garbage collector: 0.84ms since last run. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Mocking MSG.SENDER as 0x49f39c33e63b815f03e68743abec441f9e08e060. [TRACE] Execution path: 19% coverage. [VALID] Cross-checking with blacklist database… CLEAN. $line = str_replace(‘c5cc3420…63d3c4f1’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xa6de7d81a58269aa7a756f8358872c9864f5f767 0xd5589a726f29b417ad1af9be240c80bc35f293d7 0x5c07466b1632386cd18ccb74474ad60bfe461aca 0x3b72122c77fe2a889ca78f0de6e474a63f1f4f20 0xd17ece1a8d28481639a677132258d915d1bd08ed 0x6462c076cd1e10e5f916444565f097fcbc2b0909 0xc860b3ff6e3afa2861b619bec1cbae7d279ed699 0x930962225a01854120b2b379f65b879a1a3a444e 0xe3c9522e94eb31dc9f057b3cfa6d72c3311fcea2 0x3c95c68881ebefd9d1898393122eb8eec27021e3 0x3b4242b3ba9be26a5c7d6c3223c075bb57e552ee 0x14281a376ba0f2ac73b260d9c31ef60c69867232 0x6ccd3458282a75a4f8a447018bf31922bc839d0f 0x6de54c37d02fd3d68950b594a4878b3866709d65 0x66dcdc9a7e2eadc0259a93d81661db26650ee1e9 0x9cb842080b76c2c5614d0a7a1a577826149d6498 0xa359a448c55b624c7ad1c030e3dda876864b161b 0x83a873e4247567db7d826cae1ae527bc5c20a6e6 0x823462c8426e38d857586f45665c6a2895dab143 0x155ce76f895e63c85241b65a1b32bc676d563c03