ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-27FA2B7C0F25
|
Infrastructure Scan
ADDRESS: 0x4d043898a7ba52805cdfeb4cdd7646f599054215
DEPLOYED: 2026-05-02 06:10:47
LAST_TX: 2026-05-02 06:44:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Metadata hash (IPFS): 4f4dae11…dd4f3039… [SCAN] Analyzing visibility: 9 public, 1 private methods. [MEM] Tracking pointer 0x1db5f5b9 in memory heap. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Mocking MSG.SENDER as 0xa4c2e0c00620d0002473acee1b75e59548b367bf. [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Generating cryptographic proof of scan… [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xf7d2ff4c7827319f646f82eae71cd9dfd11c4e92 0x7ce4aa91a224e40f51aa4881f5afcc372be47a19 0x74a8694b22f98522a60843db454b7f32078ff5a2 0xffba98f3d5b7ba16197e201352d6f657d544fe07 0x306dbb28bc95ba4e8ab754e27e570bee65f2b7d0 0xa6d0fa6d03ebfa679cc8f4f1d048acee54f674ba 0xa17e8a78a83fa194e17aee2aeb55c5228ccd860f 0xe889a4f816fa3f50d2c54d435a1227f26391035f 0xdc7122c6b80150c91834dbb6f4b0dbd90e5d7c21 0x267b396980f10b624615b875b20c83f43eab9680 0x014bab8b8059e9840a8b55356aaa92b33be7cf87 0x218b13081c8709123fb367de76975bc01f33d57f 0xef93ce2a0e9e7be520f4ccfe96af2222e3aca96e 0xb92050f81fed4cbfa1e381fef1d2cdcc356bb8df 0xe1cf5398064fce032be5076bac15e53ef33d7530 0x192a874f4132b074ec11d845ea505887cffa841e 0x69c1ff3cf1bd098c60b198af7cb8d0d9153cc456 0x0b497ac4ff15fac328f7454c2e58551eb19f7155 0xb1297920da8e204aa8e34d60ad56fdfe07000905 0x8fbcf3283a7495609f72655b068c6f59956d1835


