ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-2A4134174167
|
Infrastructure Scan
ADDRESS: 0x0b80b54d7df64f6f8a82f84ad4d96a455fefc9d4
DEPLOYED: 2026-05-08 20:58:59
LAST_TX: 2026-05-08 21:42:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
? OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Allocating stack frame for EVM simulation… [VULN] Potential ‘Dos with Gas Limit’ in loops found. [SIM] Mocking MSG.SENDER as 0x1f76c41b90ff6fe969cb166a3c17b4f22b381ad4. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Comparing result with Triada-Security-Standard. [DONE] Triada-Engine standby mode. Load: 9%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x45881f70c7b423d3527775a60d8fac25385c374c 0x2cbf118c47759f1ba49afe1258a1332d4efa403d 0xf8df9396d5b41ea3119a358f6d9532cdd79bf0e1 0xa1ccd1bcf1a88e527d25728ea519adce491ec883 0x535ab89de6e934b8737e90307201f99bd964225a 0x466125f262b3e82793eca5813f51738928528604 0x87bc7495d344f2b506e68036868bcb5f43bb6bc0 0xb93329ee48437401d9f424d0a85bea1c56575d0c 0x2748426c2a79479ae8791eb661163eeabbe3acca 0x06a9ca46cf7a58fc470fca46c05a31a747e5ec4b 0x840a85fca74ee0890dcc3ac7077cdbc5af6ac5e2 0x06982f556353f37d7e08ea1d989e2bc17b26839e 0xb517e778810ebf6cd7892c08007a7b51ce25f44c 0x2c619a0372eff5b0a58bb9b332ef7221df6264bb 0x287512e95cefe58a7cfc045b7159917183ce6cf6 0x889a3ec8bd057969d19396652d7b43142082271d 0x3ab7a6ac496a101ffdb7d96e6b9cf21dd429f94b 0x4c62290aaaf3567a7e1f46b903b9d444a8cb14e4 0xd7c94987e877ede6b67e438dbb094f92a0b05057 0xb0d503d1291d7dba2cfb0c68b53fe01096b24e4f