ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-5D842D61DA0E
Infrastructure Scan ADDRESS: 0x78498283452e4a0db6282c2ef34e6dedf0081d14 DEPLOYED: 2026-04-24 09:41:59 LAST_TX: 2026-04-28 01:48:35 | Compliance Status STATUS: OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap VISIBILITY: OWNERSHIP_LEAK_DETECTED |
◈ OWNER_PRIVILEGE_EXPOSURE An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! | > Execution_Trace_Log [SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Fetching raw bytecode for 0x78498283452e4a0db6282c2ef34e6dedf0081d14… [FETCH] Received 12 segments of contract data. [SCAN] Running static analysis on JUMP instructions… [MEM] Garbage collector: 0.20ms since last run. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Gas used: 94670 units. Result: SUCCESS. [TRACE] Debug: 573db52b08da4c66. [VALID] Comparing result with Triada-Security-Standard. [DONE] Triada-Engine standby mode. Load: 1%. |
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x95dd0d431037b6ce68a4355217f3cd6f596776bc 0x628a483859ebf09003ed7852e892b448a5a983bb 0x82ec9cdf3c061853f69066a486b02992b2a9aa1e 0xc718bf400ceee33acbcea95aaf82f6954aa56aac 0xd3632611933911a83491120a6997eec689b4c186 0xa267adadb0977c8c4b7dbb1d4d04afabb282ca05 0xa41d3427c7d1629d3242c3876e276ea6d732025d 0xf1e0a48e3272ce17dc1cd59168851603c4f37fac 0xbeb9a6e50b712bffe62b78b2ce0ad002c3920d7d 0xabe317e84e7389855657d0d02daa168e02a7c323 0x3cebb76ce947d571391a5227ce0bf029408f1482 0xc65a1567991592f9b0ed1669d6e5f7267537be88 0x460c24cceb436e95d779a1f9ab6dcf3ec9958dfb 0xc12ce87e5a64b923391117f185aa2e61aea83734 0x9856a2c5268b1bee0fead8f21e5267e13c8255e1 0xa9a039b551f59708c67d94fca9c2bb1c016bb42c 0x694620e3703b25b75f9a6310bd24772f83fc7e9d 0x0598b344630ff742a15b6ab978305c9c805193f6 0x7adf0c4465ab5e79fa122f0c1eff6caa1db17310 0x1a72c63e8a7d2594dd9f3e62538175370194aa2b