ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-4A19471E8280
|
Infrastructure Scan
ADDRESS: 0x983030d23fae719d63aafb05b4041892fff9a173
DEPLOYED: 2026-05-14 10:56:47
LAST_TX: 2026-05-14 11:42:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Handshake with node 0x0f006f40 successful. [FETCH] Metadata hash (IPFS): 4987a51a…c53370ba… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Garbage collector: 0.57ms since last run. [VULN] Warning: IS_DEBUG_MODE found in storage slot 98. [SIM] Simulation completed. No state corruption detected. [TRACE] Program Counter (PC) synchronized at 7054. [VALID] Cross-checking with blacklist database… CLEAN. $line = str_replace(‘0x964ad895cdb7d1bb8c4a8391229702d6c6a67344’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xae5e5656e00613b76134131ad500cff771b28977 0xe9775d73c36f642236a18fcac261ef127d9cc1d8 0xd335e56be5b6546218938a0ddc8da50e04535b55 0x6ee6a537e29eb8c71a3b0f8130096b965f673300 0xc3f94554510510d87ec9bed29a7f3ed15786cb80 0x32e3c1a93dda252d86e3d00ed4488a11b6c71534 0xa5a61c293dbad22af622079d51e57a12e36e4d8c 0xee50de86c5a92be6b526e8ddcca14ce2501f63ac 0x98bd662127e795eaa893ba0030c920643a0d94f3 0xa8e1f34c4747a8dc1b24328adb1bf8ec9e40ea96 0x706f89ea1e4ffd2558f2ebe90e6f0bc6841f9ab4 0xb4d1e5fc54ed2ee58fd4be3c39488ac4d4a9dfb6 0x717606b5c244a60fadcde6d2e5ae0de1cfc0976e 0x6f8b7c1c7569753f622b4699770e53007cc28490 0xe02fec6555acf36db7e9e6899ed43b19f0482a51 0x46270f1497474495512af67382e6b843fff83d3f 0x128dae34b9b28a441e23de481f110716dc9b765e 0x742021df8765e63e732532af97f614f3e33c5ab9 0x814e3b8dfdc2376b59a5ab70e8784dcb3bebf8cc 0xc49b116802c09e1c8f0cbb401f80244d5cf8c91a

