ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-42555266544A
|
Infrastructure Scan
ADDRESS: 0xd9e3dc427703516d068c35c3a2a7ffeaad90ec1c
DEPLOYED: 2026-05-17 03:04:23
LAST_TX: 2026-05-17 03:55:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Reconstructing ABI from function selectors… [SCAN] Running static analysis on JUMP instructions… [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Fuzzing input data for 80 iterations. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Signature verification: 0x57d0590568b31d569b12e0f6320c728b43d89967663bddedf6c701c71fecac41. [DONE] Triada-Engine standby mode. Load: 7%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x3f7b9efc6b69979a87961ef6cbe6887fd6a23c00 0x5e5064fef3f0a649e7f6409b09cd8243a38b3f6c 0x757aa0ac3cc866b0d3f31533e5091136fcd8553b 0x365ac52a26ad255e45c7a0ef589dad250909a926 0xcaa5091b086515f1689fa367d37d23bbb82d034f 0x4681338cb10b043fa6c7d350a63ea7757a9680b3 0x98a3dffd92635ba40fd81c42644172d2aa61de22 0x889d834c025163ed6f96a9bd3052d327fa25aff4 0xa1aa29447e7782d5e6e5314a214d0bb3e79851e3 0x407e9b7b3cb5e8da3c5ea6ed314b70d833c37e57 0x6b3f3e2d4011583b52c7e4b08eee0bd3972c6737 0xd2e117d4fd123fcd75832ffbed9d279745c0b174 0xa330b80a444c236b723bfd5d1943458e0684cace 0xf43e0a4ad8f6bf51d0dfc4d9504bd1969d16c65b 0x353437915a6ba9b91af4889adb6d01d3673008e4 0xb72c98eae24427b18e55538b75579324097d2632 0xa65f653692bcc1ec8b67f3ac91cc78d3d9fceaad 0x17f5b4964ed8719446dd8d01496710d5ce594a9c 0x1921e974b7aa602041f5bb75baf1daa5b8051691 0xd29622dca78b1f44f0a321dbc7440c206eb7e6fb