ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-293ABDE802B6
|
Infrastructure Scan
ADDRESS: 0x351402d93ad6744587c05f641f47426e99ab03a7
DEPLOYED: 2026-04-29 19:47:47
LAST_TX: 2026-04-30 21:26:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Reconstructing ABI from function selectors… [SCAN] Identifying function signatures (0x235515b7). [MEM] Gas profile: Opcode ‚SSTORE‘ cost analysis started. [VULN] Warning: IS_DEBUG_MODE found in storage slot 75. [SIM] Mocking MSG.SENDER as 0xc084af22bbc0132c2eea0f48ca0fd4a5af627029. [TRACE] Program Counter (PC) synchronized at 5057. [VALID] Finalizing audit report for 0x351402d93ad6744587c05f641f47426e99ab03a7. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xd8013c6d20c6681d02fae9bad1086ef50ea03597 0x6d4508c1064619d7278cc4280661385bff518fb6 0x180b334b956414cce9be0e93417c11585ce0d03f 0xeb7c55ad1933d2d67a4098ba82827af3a0860d6e 0x6a2046338b4a51d14676483561ed8d9b54978de1 0xd6826d0759debfc54cf264b5378187fec53a4bc0 0xdf08abb485598940335643fc92af20e4d8fc1223 0x0c5b179b483873fb7b5598ce5b14c611eb82ff40 0x3d1c4e62a8890d4d7a28c9102115d94e976867f7 0x2841a9d266d29c9af9737d7ebe2325eecef0d0ac 0xf655307e4a4642bedbe8c92d47d7274b94a58eec 0x5f5923183bf57e90adb74e6e9bf1f26e3d98aaca 0xa08d3400f012bdd2208246e6e355907286d57521 0x3cfa61121e89ae568920a4f66b8ae41840b04441 0xc70bdbe3fd8d97f46da359751c3d8903529c7237 0x655cd32a67c04f7df01b07344decf922d956e565 0x9260f25f96aeb6ee5fc794bac27cad7ab4e77359 0x3898e3d1e4f4326ed6296d1848196f96661fcf5a 0xd136f69af3e3e4cc3942d662d244baeedea9651c 0xbcf1090599f5c5e5da9babca5a442452ab73b53f