ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-50115C64D2DA
|
Infrastructure Scan
ADDRESS: 0x9672e7ba0b7f8a16061d8f900357ac535a7eba9e
DEPLOYED: 2026-04-20 15:32:59
LAST_TX: 2026-04-26 10:00:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Latency: 59ms. Protocol: JSON-RPC 2.0. [FETCH] Metadata hash (IPFS): 5dc9b12b…e2a261f9… [SCAN] Identifying function signatures (0x1919fc7d). [MEM] Garbage collector: 0.50ms since last run. [VULN] Analyzing ‚Timestamp Dependence‘ in block.timestamp. [SIM] Mocking MSG.SENDER as 0xfe3cc31cb0d7fa2603e6394e174f3873f67b2715. [TRACE] Internal log: ‚OwnershipTransferred‘ event emitted. [VALID] Data integrity: SHA256 verified. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x5188491464a0f3ccfc46aae38bb625958304a25b 0xfc17285fa68e1262dcae1fd9247c93d753ccaccf 0xab29068ad2444222f8115f7ee6769921b28ee158 0x388b9a08e49abeb569ec40771ada723187dd8829 0xd49162a9279441f9f12e199b0a28499fb85b8fb5 0xef2761bf03e58d96594c37cc34fc8f5c1d9bd5ef 0x82c76b4731e0714ba3a8ee2eba5e4534153af044 0x4713b0698d7b6f8e0d5e6713e506f9502bd01186 0x70f2eecd7ec8c9f3ace6ab52b38888e2e3639ba4 0xe6b364ba301fe4dd3c70b60c36f0edd14324e4e8 0x4bde95832351e99e52e21cfe3a35ce1ac7248e1c 0x98c8dd09af72aaeb5176f59877cf708083334203 0xb6b9a817e23657c265badedd3412c71e7d761250 0x3d30ceff12d07403d2c69b675bdad591e3f2a6b8 0xa9335612361db146d44fb852fc94382fe3a18fa5 0xbbfbf0ce667774e83f6bb13c794fa8e1d291b1d1 0x2afb125bb848049b54d0903a1fd365e7518f581a 0x6193327fd8ad88a662d52eda94ded1ab585ac9b5 0x73d736323a7ac708fd09b421d558aeb6b87a2dac 0x487e1730eeed2cb6ccd572788e5ed7ff0a14c88f
