ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-12B2947F793E
|
Infrastructure Scan
ADDRESS: 0x41a180762564f8362fd2f6985b253010b8c68749
DEPLOYED: 2026-04-24 18:22:47
LAST_TX: 2026-04-25 01:25:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Requesting storage slots for offset 0x00… [FETCH] Metadata hash (IPFS): 0814aaea…e8e2c317… [SCAN] Running static analysis on JUMP instructions… [MEM] Garbage collector: 0.23ms since last run. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] State change detected in slot 0x6c. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Comparing result with Triada-Security-Standard. [DONE] Report exported to IPFS: 0814aaea…e8e2c317.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xb9eaf4a3accb4e748a41b5ede164e2d7c3cd7388 0xb1769b711c958ca9b539c78ea689f056b1061d9d 0x3ee8d7684f94016538eaddc6ce09fa5f7efca455 0xd9619a1264415cb3ddeaf521bff1b470011e73a1 0xb1c1e3805ee41495210c7e43dfeddf20b75c2f63 0x63edac47db7bc42b74ec6dbafbbdacf0996e9279 0x8636ec733ba97150d8a4663fd382661ed1957ca5 0xf25d21f9060c3fc8cfd7327f8d41c4ab8c76e5a5 0xb0c83fe3cf4d5a02e978a08da4d2be8e7ae5dced 0xbb9e8d2fbd4f89303deb81442f9b85457f710c1c 0xfb0fb1a77f3473ab5733f0109691fed70d40ff2e 0x1d3f4b6dc4804d164074575b5dbaf3440d9011ee 0x36ec7d13af5ef776e34b828c9a476f0ad4e59667 0x8bc6a3c45ced0fa635df5d9141c05e28a7e7f030 0xe2d3ad2c9dd716727796b4e24ba1bb89ac820c78 0x7abc7128cb091d40c88509dc9e05e94bf9219107 0x92b0a53ba878834e08ff9fa2226a4ba59e0db026 0xb9226244e3cc691bf60d2498b3018ef30e39d7ee 0x8c7c0c884d4efe92b85a3a8d89e77cb7ac9f9db9 0x8b4c4fc630fb5f88e3ac7c9c588e011542ec8464



Comments are closed