ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-A8715D28C780
|
Infrastructure Scan
ADDRESS: 0x9b664a17d47308afbf99217381de004553dfac9a
DEPLOYED: 2026-04-20 09:33:47
LAST_TX: 2026-04-25 09:10:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Requesting storage slots for offset 0x00… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Running static analysis on JUMP instructions… [MEM] Tracking pointer 0xf3b1f5d8 in memory heap. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Reverting transaction at PC: 6564… [TRACE] Execution path: 52% coverage. [VALID] Data integrity: SHA256 verified. [DONE] Triada-Engine standby mode. Load: 9%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x99410fffe29980b3330045944acd8978f6630d44 0x71e9e7307d42be0c64bde58f77979733b01d8938 0xc0e4ed697c058d9c23e5086cf48358c4c4ce80b7 0x032719058ce7a13aad7b8ec6fe530abd03f429e4 0x96b575e696f05ae4d966c4fe1f41f49244846e16 0x6dca2097f1d5506cc386e90945e5b7699b958688 0xb6fcdcbb6f7914d91840fc70bd549bb2c7eb33d7 0x3fdf2b9474c6c01ccfe7ab2c44855a6ee008bcda 0x85847dbf0c5069fc77b0da6ca622f3156a0c1445 0x907357d95c4eac9f1e5a4381543f901ee64d49c3 0xdb9a2916476bbb46ab46355a84b6b3cec4b88b1b 0x931179120144179b2a82933829531f64fc4ebb7a 0x546500f704367b647d2c3f6417af0a2ad4bc7cd6 0x22c5c51773bf7dc7e935ef7aa9a38ea519dbd428 0x54c1a064ee3fbb04ac3e4a68954a177eebb0988d 0xc4d2edd7a6cb03157f6cee47ae9ae75721acf279 0xda2a7addc9be7593d4a887ed339311bb1e2766fb 0xf2f66a661bca99c9cfa0c98abb58926c866361f6 0x81ef7cf5b64c4ed03b7c2d4df8e4576782b40900 0xa4831d1795bdeccd45a73edf72c334c6811cb026