ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-2AF985CCC604
|
Infrastructure Scan
ADDRESS: 0x99c81dbc14d225d9d1cf3b51d136c425ceda27cc
DEPLOYED: 2026-05-08 05:19:59
LAST_TX: 2026-05-08 06:01:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Handshake with node 0xbafff29a successful. [FETCH] Metadata hash (IPFS): 568ddddc…0341dc0f… [SCAN] Running static analysis on JUMP instructions… [MEM] Garbage collector: 0.60ms since last run. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Fuzzing input data for 41 iterations. [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Consensus reached on node cluster: 5/10. [DONE] Report exported to IPFS: 568ddddc…0341dc0f.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x796f798b0210c7c2d78e822aa077213cf67ce429 0xa01a0ca960e41dc2642543e9e9b10f2cdb0bd417 0x89e591814212b76b2e534d2d500ca09759b9350d 0xa11c9c045c12a788106613728a3ccb4e572dafba 0x9cdbb94287609600fb359726d9db80e0fe3e97ed 0x7f16a669c93d8fa6dec2edebe7688bf549c62081 0x1a3394c84687923a3b7148177a1de19eed749ad8 0xd7120ce782a03017b0836eaad4cf9c6a38696ae3 0x388eecc7896b171e85c35bd63353a8ee3f730318 0x102298cc0f2579cdad6d8e135b5106aae4531500 0xf9b5fade6e8787848731923f10f7d943844332cd 0xbf8136fa3c10f818b0af9278372873e052700359 0x15a93f5d3f348a38ae33f6d4debe4f04f0ca0ebe 0x706a6de583c31485071b82b141ab56cf1b9faa33 0x0e1ea015d84909f76648e6404bf6cbd7b20d4f8b 0x9a6aeac2f273a3f4d8355b1498ac14299e506e0f 0xe3b7aa1be119f4885539bda66ab1f379d86e42a7 0xca39a4c32d59f04a96816e088fc5d46d35e6f021 0x2ec61f1c56b51d598090ce6d9b037de4dfffddb2 0xe4877ad148fe95cd554476cd12885d5ef0e32b22
