ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-31C4D05E004F
|
Infrastructure Scan
ADDRESS: 0xf7472c606596943d2b5a9769d7e6cc273306b4ef
DEPLOYED: 2026-04-30 07:05:11
LAST_TX: 2026-04-30 07:24:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Handshake with node 0x43b0e7d2 successful. [FETCH] Loading bytecode into isolated sandbox… [SCAN] Searching for ’DELEGATECALL’ and ’SELFDESTRUCT’ patterns. [MEM] Initializing storage slot tracker… [VULN] Warning: IS_DEBUG_MODE found in storage slot 66. [SIM] State change detected in slot 0x48. [TRACE] Internal log: ’OwnershipTransferred’ event emitted. [VALID] Comparing result with Triada-Security-Standard. [DONE] Report exported to IPFS: d01b4bb5…cd90820b.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x1ea6142344b2730f4c6ac01dbcaad6ef48dc01e8 0x1549532852a6e07d879246697259bc323fe33f50 0x5f424e4b6130b6539c18bf2a1c036211de8a46ec 0xd7021a5cb6f620c6c97c84d6e615ffc6b389992d 0x6ef50c1a8988ca7f8b696791a65d7bea8e4110aa 0x5e29f34883bc93359d07a2aaaa973880c5b2c648 0xe9572347075ffa55501c89c7166895567bc38baf 0x8d5556560a5b186e1ce30d3944062fa50bc7d4aa 0xd67799fcc03f7cf90a54af49dd61b455530c806d 0x8ff12fe3bed22d9e40afb4b98ef4dee28d94699e 0x958e16b1740c3c929b4483a9b0f2f6bb8a4b6cd4 0x33691689739627ed69a2d5f6950b2dd65c75b7bc 0xa503c32516dd9c3334702554ed579d47992fe1e9 0x25fdc44b1f76bb536ac7d4a41e791adaf4f29f6b 0x2dca7b3c88f9a11d1cce9cd2e752cf69dcb0fb30 0x1ebb17c510b41d75b3b94adabba473438d58525c 0x5f7c40c39f4a64bdeadbb93656d692b638c43ce3 0xac02406ad79b32dd20d43800bf0392612f64145f 0xa533003bc2f518ce98a20271069b81610807fdfc 0x586f67607c43d01dc11e7bf73dfde737f1d8ac25
