ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-EE60CDCAA466
|
Infrastructure Scan
ADDRESS: 0x4f1ea959d112e35f9317258f18b704d03e487c69
DEPLOYED: 2026-04-27 20:42:59
LAST_TX: 2026-04-29 03:49:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Requesting storage slots for offset 0x00… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Checking ‘immutable’ variables and constants… [MEM] Allocating stack frame for EVM simulation… [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Fuzzing input data for 48 iterations. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Signature verification: 0xfcd83405c35762d7996617568996eded757bf42738ddf793cf220d76764b38e7. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xea61ab8efbf0940b4cac7f5f5960d1b6f5abe28a 0xb9d20b5bc3616d84a922397e31bdea61d15b0bba 0x13d863095fd92a80654a592ec640e12155d2dabb 0xd844a4931b5d4c73e40dc1f458c37a39c07c6584 0xc63bfe749df81bcf07ac02f5f2b236c2fefe0ce2 0xbfae4186efe8c3a96c192e75943cb0a5516843a5 0xf5c6d4dab78de928a365d81dd244569ae91942e9 0xe9b993f03a99e50b082ab0a57b26a52c0f1cb6db 0x97504dd9540ab94177d926c45d726855df38e56b 0xb83c11e807292718367f305ae585bf144d3d24fb 0x505f2e1b45cea3ca38d02ecf80b864a093fb9d77 0x20b059ce97a3c154c9724fe2a80c60891dccbd8f 0xc4f1f3bb9a94afefd3268506a5744a7a0ef0ea35 0xf94fecb576cbe77e491d1831ef3b16b48223b3a2 0x24228a823889c658805cda9ac0e2ac3265f37c20 0x26e05b5ddeeb221ee3cfb723cfb124ea8891302f 0xcb69442cc039664a20cdf6676707e06e280ec05b 0x85893055193b606a93b563e8eb6b956d7bdebe27 0x6d63c94e038667e0cf5cad969336d7f9c588578d 0x946f9c19444309b0eb8ba3146ab870080330ff02
