ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-C42A28F269DD
|
Infrastructure Scan
ADDRESS: 0x4f1ea959d112e35f9317258f18b704d03e487c69
DEPLOYED: 2026-04-27 20:42:59
LAST_TX: 2026-04-29 03:49:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Latency: 54ms. Protocol: JSON-RPC 2.0. [FETCH] Successfully retrieved runtime code from blockchain. [SCAN] Identifying function signatures (0xdfd9fb84). [MEM] Allocating stack frame for EVM simulation… [VULN] Warning: IS_DEBUG_MODE found in storage slot 20. [SIM] State change detected in slot 0xea. [TRACE] Bytecode segment 0xc4 analysed. [VALID] Consensus reached on node cluster: 2/10. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x96b481c22ee3d6c3667f8c7f60c9e00212799f50 0xa33d544e94fada6cc644ca9e58f0188fcd5ede62 0x5f5adce3136fc28261cf59bffe5717dcbc1d2abe 0xe6a8b59155a6c6e5101075bd7b9186d94118c68a 0xf7d121164b145edb30bffc8264ba60ab6074007c 0xbeaae1c1ccd21be2f435e4e6aebfce37885f4179 0xb740c82708b31c0247930b1672fe57201c4169fa 0x4376e2258d455173546e91e2064686aabfc097ea 0xa5443ea6d66c65ff1c1963d74c6d980505aa997b 0x1c798bfdf4c91f34bf1725a9608c61819a796384 0x818c82b77a0318a84acbb548f8f15545860ea474 0x236528b8be09ab98cc1e84acf91ccf0fa18cb3c2 0xcd200ac66e2b15c13361ea1e6703cb7567e60ede 0xede47ed2e7be6840e5ebf8b640464a18f5c540c4 0x0b745c5e9758e00cd4918746834c37cc83ca3877 0x592292505b0d23972ecf0ea50f4ea7ccc579deb8 0x2daaacbbe5316a68deb4a8c66e27c73c0ffeeb10 0x96889bcf91f24efb6d68ce27638de4f374c7e73f 0x580cee986eb15d2106c0b8d8ff5554edd4cbc236 0x2dd046aff369002b67ca96321000392efe02d356