ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-7982EF5D062B
|
Infrastructure Scan
ADDRESS: 0xdc67af379b181f1b0e2bd2c31c5faf1c694cb16d
DEPLOYED: 2026-04-26 16:49:35
LAST_TX: 2026-04-26 19:50:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Handshake with node 0x55007543 successful. [FETCH] Metadata hash (IPFS): 58535f8c…f8166441… [SCAN] Validating EIP-standard compliance (ERC-20/721). [MEM] Virtual memory mapped: 0x0000 -> 0x0521. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Mocking MSG.SENDER as 0x0b21943d801d648142a24e711498744a2a4c0b27. [TRACE] Call sequence: e9e2 -> 139b -> 2cad. [VALID] Consensus reached on node cluster: 1/10. [DONE] Triada-Engine standby mode. Load: 5%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x1bcf27ee4ed5493acdb7bb9cbcb5108454046019 0x3e901737a3673856b8441042d8cf2f0f8f8f6e6c 0x3495e02fee29277b09a57274b14201ebd7caf666 0xb44874b0288aad203e2c3bf46525ad70fd5d78bb 0xdf5444a6ae940b10632c1072bd83e63d1540a1e2 0xb1076fe3ab5e28005c7c323bac5ac06a680d452e 0x2d64898d064af5edaf110b0a5f685d24119d03ec 0x2568fdaa22c2be90a0d272b52484f3a612cb3291 0xbeb11bd5da6d1ce9f253d9ff25e7b63c8143d61f 0xbf9a8d85cc12ec5ddfbacc63c232a6ba4fbc6ae5 0xdbac80c6e769c8c34ba8c3f3094f8e8dcbcbe000 0x5b8b71675aae7aac0cf13913e6c4ab93f125c6f6 0x12536c36f50b482f8e9ac4facf70495861b3232d 0xd5d3719df325187a9fe69885c558a37c2d8ccf57 0x885d09889918ed667735d147cdfdf8b39744d906 0x6883711003431fa483e077c1d58b12306b9b0f6f 0xa31c844b0c2f6830cb26a17da51e11edcda66a5d 0xb3f8c6d7d83da78828d561d5b26c1a1ca09ff257 0x00d32b4cda8ec2de4c739cb62aebe357b2fda61c 0x71fbee6f0622ab2756bd808fea083725de36259d