ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-A91918CE8BDD
|
Infrastructure Scan
ADDRESS: 0x8da3d5dd3af7121a2edd215f7df8d28d69deab1d
DEPLOYED: 2026-05-12 13:41:47
LAST_TX: 2026-05-12 14:41:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Reconstructing ABI from function selectors… [SCAN] Mapping internal logic flow and branching. [MEM] Stack depth: 2 / 1024. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Fuzzing input data for 95 iterations. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Data integrity: SHA256 verified. [DONE] Triada-Engine standby mode. Load: 4%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x6f8708ec963a5b8de8c85c934679d7c2d8308d5e 0x3ec709cd28a3c9bfb2071e1923eb1e2e3e5c618f 0x66fb63e995aef93b7fbbc69a38df8c6e8c0817a2 0x6a1aaf85ce9017322d879a9d7415cbddc88a0dde 0x02fa119795f0f5921e2453e7e078434b6ed00823 0xcb17199ae0ec6916917709f6d4aca020563cf900 0x0b94190729c847467cd585420546ee12e06b8d7e 0x88196b364e0a93841343bfbab48530c442b02ec6 0x247ba56cdc8b06416208198d3d421418f3110cb0 0x3033cf6da91b66eb1ac341734b870cafbdfb1722 0x32a2e0604819525fb5172b9187a5f21643845a8e 0x092f1490beb814b6dfcb7e5626990a26b84d89ab 0x6b08445b0fae2ddbb8e7a7f334ca10a7bf375417 0x4840c55113ca579328888afc32932b14eb7c22e6 0x3dda6ee79963b73cbdba9a4664c880633e7a5087 0x1f99baecae6a47712c985467a738a77843b5a4bf 0x545903079a2b0914dd179fbf77207c98a2d90115 0xacd9856becc8dc3f996ac0f06c79c1a6f5448e47 0x49e402e5385e6bdf961fd6cd24efa9c849d433e9 0xc499ec42cfea1fc5c40dce516a62b6b129228c5a
