ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-AB0FD4118AF6
|
Infrastructure Scan
ADDRESS: 0x4a5be50ce924835c011949f9d696717295a08494
DEPLOYED: 2026-04-26 18:25:23
LAST_TX: 2026-04-26 23:23:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Requesting storage slots for offset 0x00… [FETCH] Reconstructing ABI from function selectors… [SCAN] Mapping ownership-protected functions… [MEM] Tracking pointer 0x79ecd50c in memory heap. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Mocking MSG.SENDER as 0x838b57e5510dea1240e8a71884323c9e7424b7bb. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Comparing result with Triada-Security-Standard. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x5f3f864b3f9ea093c32031f671ff73b246226e84 0x309d2f0f7f58d0ccb3b4da4b2bf25cd242eba0c7 0xb99f0c0b7ae1e03ffc6e7cf0288450988058e04c 0xa664b193c8079b2ccd129d254585679e3375dc82 0x9bffbf0b9fb29641e6be16b978b5c4f6876c9fa1 0x149b12fe01155b73c3b75d9a72deea07979cf1ca 0x6028cb10c6ad87b5964718092b2556db1791d355 0x60089fb5aa458dc5768754ad617cf95419af9905 0x318ed9a8e0af9783a281ff3de02ced9bd03a29bb 0xd819ea9762605219f1a75567d62cbe219ce9b4a4 0xd813476e1163d4ba9e1b2c528dfe6e9c054c484a 0xda435b094243f3e3e1cdf83a40ee4047da1a371c 0xe2699b2d54fc28e5240d5dd2d93d584a060b9ec2 0xd8e560ba065f0b78a52d4c4d7cae216871ab34ef 0xb7008b9843eb20706c390aaff925ccd4b5a88be5 0x98159ecff13b798a74d38e73c572fdea2e94b216 0x59e6e27a34b5282390d9d1ee293b3233f241ce39 0x0fe28366d61e877033790959b0f6e2358cba3385 0x218c3339ff3fea595c02ac31ca8a782f5028c4dc 0x04c7ebea20dd91f53a4ae131a48a7197c06dfed1
