ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-84450D5C6ADA
|
Infrastructure Scan
ADDRESS: 0xeaf2caf6292fae404cc35291707e3fb447ed6a21
DEPLOYED: 2026-05-02 04:18:35
LAST_TX: 2026-05-03 04:06:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Warning: No source code verified on Etherscan. [SCAN] Checking ‘immutable’ variables and constants… [MEM] Tracking pointer 0x14b16196 in memory heap. [VULN] Warning: IS_DEBUG_MODE found in storage slot 90. [SIM] Mocking MSG.SENDER as 0x262a9a1368da3336ff16e32a79d11d3cb26d323c. [TRACE] Stack trace saved to /logs/TRD-1F49C783.log. [VALID] Signature verification: 0x983aceb6bf6fa52930f1d96504e8d2a333d57e3d7222a0f33e66b0f7ef10a8f0. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x3f01eb516992b5d16122dbce489d5e009966a98c 0xf41c5683680f9da33050577ec5c45a7d5f2f9be5 0xeab70f4f2a71c8c1f2d54e02c02a8241adb4741f 0x5b2f72e4e130fe104e141ad42bf8b5d9703a2b87 0x58b2188824e92fadfe7322d46f55a7680824fcb0 0x6127300371196ca9e6b425ebf0e719bf702d379d 0x6c90c2ab54e808c4a45c379cda5ab47c0cba086e 0xa82b910cc284e7507314ad9c29dfa770a1d44dea 0xace41bc57fd5b3b07ad9b1e81a67e2e7ea23a085 0x1ac4e00645528a53c87598adaa2f609d25b7f00c 0x833e84ef43da48416df6c046c7b803602a3095a9 0x976434bd20bb3ee41a382cd57ed11a1827387081 0x743fcebce2099403872186431c3e02e02fb8cf14 0x580a86c65289448973d9cea7829b46f1d50eca4e 0x378525acffb3fcae4b05a8a633078e34332cef6d 0x8f493a96676a9c4050fd7d4be43af53ec205ff23 0x1c5f6036a61e29b743c8437792a452e58835c21b 0x7c7ac279d94ecf9fa197d0dc5f0710de752a59c3 0x8bf58109c41b508df35ab31a3b780dfcda747460 0x5e63737584eab76c91cc31961d6d1215cf924dff
