ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-65F1A4EB1A27
|
Infrastructure Scan
ADDRESS: 0x113ae5aa11a63f5ec3deda19138c3a0bfc72df2d
DEPLOYED: 2026-05-17 13:32:11
LAST_TX: 2026-05-17 13:51:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Latency: 33ms. Protocol: JSON-RPC 2.0. [FETCH] Loading bytecode into isolated sandbox… [SCAN] Mapping ownership-protected functions… [MEM] Tracking pointer 0x52549774 in memory heap. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Fuzzing input data for 24 iterations. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Generating cryptographic proof of scan… [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xf1c534e2db863938996155585596bd0d77aa65aa 0x73eb6922d7acd3b601b7f1bc557728002332e78e 0xd02915566318ffcb3a2760010efb3c810bd1c9f0 0x677e2948941b5adf19a17328143ca7579137de08 0xac5db83a7b9a6096691f1bf77c3d4e42ae28313c 0x2d8031278e5a5b0536a9a16d2ed245bccd5a4e25 0x4875a4a4786d59410f4a5cb88b059d83ebe62338 0x24d3066c10a4b895697f98853018deda1de5941e 0x79531d271468f27f21fdf622526cfb17f530e8b5 0xb472d134fecb5e5e46636aef7ec82452c6e022c0 0x12795466490be4bc35acafabf46ead3a4cc721f6 0xa85b56478ff4307b5c7cd50fccd3fa4bf55ef7eb 0xf74423f34b4540f9a84b68815b5aebb38aa9e700 0x1e86cc4f9dd9326e8f1af451742ab42e2177e942 0x4265b7fda07b2bac3a46c177b9c04b50f791fec1 0x5a49277b37fc4427958d7121d8fa71ae02696ad3 0xfc4872567334d27f074feef5517ecfa1ec5e644a 0x7e38e3f5afaf8b1ef869cb8614a7a6ee99b083aa 0x31c7c4e32db055b3631b4b9914ff7c8ca03aee41 0x99a385af186ab46b6ec9bf79d3904f2deab08f58

