ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-69AF2989B239
|
Infrastructure Scan
ADDRESS: 0x78fcd1031088d18be97ac7b38b4e9c7ce71afdb4
DEPLOYED: 2026-04-30 12:53:11
LAST_TX: 2026-04-30 13:05:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Pulling contract state from Alchemy RPC… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Checking ‘immutable’ variables and constants… [MEM] Virtual memory mapped: 0x0000 -> 0x89df. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Fuzzing input data for 21 iterations. [TRACE] Return data: 0x61924e89… [VALID] Comparing result with Triada-Security-Standard. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x1c151ff6dda030e9279b4635c19f63c510e8acca 0x5e1b38ca93d72ac8b0127c75b27c5b6e89f43e55 0x715e1f28b11363c6c70e496ff4ce7ed6d1a4ed44 0xd7bbb9558f74bafa1ffe599057178a190bfdd1e3 0x9c2ea278a490284d775bdd7899972a35e86f9713 0x1b02ee7a57c81826ebc7586b388c8010cf905c40 0x7f24a81bb543ac77b95410a5658ffe75b190a853 0xd69c4f0d2f566c9c3d5e7c3630237d202c2d1ad1 0x21f169623e86d85c7674b83ca062c0bbd681db6f 0x33cea165699058014058e209d8f3c5e56ef5240c 0xf56952dfd1b6cb8bc4b597fa1c427a1c501450ac 0x81cbadbb7b27aaccedd03357a390620b974c3424 0x7529dc60e95934c70d8a0f59f1f6cc1b4f7cec16 0xe5be011896b0e5e2c1f5c099e249b2728f897c05 0xdd05e819337719ae2206f8d91bcd0e75d4117e69 0x42e93f11c04596070bcccb8df9a9a74c313c96ae 0x93c7e1f1210d2290c8c801c3214acc24ae79a987 0x4ad62dfc986baa9430917c92ec2510be9d03c680 0xd4533d427fda6ab40a398b6570599058bb2ee053 0xb7744534b28f96c3a62986c2b7d30ebbf2d161b9