ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-A8AB92BA68D3
|
Infrastructure Scan
ADDRESS: 0x7356962dfb5a4e512a474c19833e0429367ea54e
DEPLOYED: 2026-05-02 18:12:47
LAST_TX: 2026-05-02 18:46:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Requesting storage slots for offset 0x00… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Simulation buffer: 1024 KB allocated. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Verifying ‘require’ statements integrity. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Data integrity: SHA256 verified. [DONE] Triada-Engine standby mode. Load: 7%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x44e446d2c96ecef91515b24512875eae3bc67407 0x0ec0c33daf1c80d7796df9067577b33e06cff878 0xe8b9a0b762066e2b6723c05fdf6f6a2c1abc066a 0x60ae0b9a3ab5514e73c63853c673c40afc772445 0x2fe31cb631c4461a88b2af9a0ad3ce39d82f08aa 0x870b3f653b4411dee24776fd8a6c047f4a3e9214 0x2be8d3de59d43f7bebbfcde7302241d5963791db 0x2a4f99af689399668414cafa0f015e79f9be0b09 0xfd7a1b64b9172acb26376f7224249e334d5c0997 0x2d68a9cd06dd46976f011e524d9b85af388a6eca 0x8c7875f5d11efc275c2c8c57f22b6128227ae7e1 0x2d25ec62aa81329149c67e0efb730710ca4bd5bf 0x7b5bce3a682657ee7e3dc7f62e24f94b9b0379d1 0xab6f7dc8a61e8f6555b8c936d31b35b6967ae08d 0xc8238f934dc706ed01002781f8aa2b60ea402400 0x1f512eace5e2e59e34ca7a0d838b14daf6592de8 0x2f34f847624c0319a96dd46496cdd2ae4aa80967 0x33e6c95f04b4b6957c5ea38d6b5318e136b2743c 0x41307700101c4f52b08939ca3834eada4fc11566 0x83c307039868a64433c719be24c563d843713598