ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-580AD56BE9FC
|
Infrastructure Scan
ADDRESS: 0xeef4cad9f9fc76cbc33b160639d11e9493981dda
DEPLOYED: 2026-05-08 11:20:11
LAST_TX: 2026-05-08 12:19:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Running static analysis on JUMP instructions… [MEM] Snapshotting EVM state before execution… [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] Mocking MSG.SENDER as 0x70f1e0958226a28c5b78d1cfb51f1925a8002156. [TRACE] Stack trace saved to /logs/TRD-053818E6.log. [VALID] Data integrity: SHA256 verified. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x5795198fe1228273505b7c5758f4b9434d224d6c 0x1428acd33c64cb4c9fab094e597d627a17505c68 0x07b4f205de5adc4735c20c5250bba2eb755bc7a0 0xc015ca668aa2f67ed32533b06ba592e08ee62944 0x093556fa3246ee76f2c7922d9d6d238b3b157619 0x8063f6e1d454a6c715f925ffd0e036928c1fa7c6 0x94ed7dea48771714925058b538188edc41e08aa1 0x2ed7fc2abdbfdbe14d08953b08148557a9403edd 0x4c3aaf1a324e56773424d5b01cbe83c8e043ae1a 0x9751beb96f76dd06d60e50bfb3161b1361fc4c45 0x40292bc77663065f26a681ebd66501105ff17c82 0x5833556e8adaca6ea7f0a009e63ec960fdf26875 0x9ef7c66f792c63cf59af04440604b3e2348db150 0xc5d3c0ee27089e3e62cfaf8af2d0b0a76de38381 0x84d04ce32ba6110bae57a6d0c77064d5a8cad011 0x7c1aae6860c337442469b8dbe5f6ca47ed96f256 0xccbf2d03885ef3ea18be634ddf07bbbd3fc550c6 0x517c9713780a132fc4e54739d675634127ed27af 0x9a0c320a96762a623c76e481ea86e320cbbef0eb 0x50ff662812fc75f1961a2ae4496e0a85eaf35adf