ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-9CEAF78F9E96
|
Infrastructure Scan
ADDRESS: 0x31c3fded6c6080e76ff4ed97b320afa84a652ed3
DEPLOYED: 2026-05-14 16:54:35
LAST_TX: 2026-05-14 17:35:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Received 53 segments of contract data. [SCAN] Mapping ownership-protected functions… [MEM] Simulation buffer: 1024 KB allocated. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Stack trace saved to /logs/TRD-80FFA2FF.log. [VALID] Generating cryptographic proof of scan… [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x26f049e00ff76588d8048734f9dac4c19ae576cd 0x198cb56380f96822151bf9c24843406e99947275 0xad1112eff5c3c41a11b81a1232b6ca41722add0b 0xbbc4f9b70178de75b626f2bef4989e65911590e7 0x3143267c0c6c18ec35c655f15cf65152fa5a91f2 0xc7f07528b8e1b87de70f41549b6233d2b0fd8ee7 0x05ecd412728ec7dfe4267efe83da4161002349c1 0x9c52781b37c3745157f6c0b07af55b82bfeeb4d4 0xaf20646d81d1cfaf8e59c2df41532194e5ff5282 0x994ff6d4a0d51505debec3f47832b280b8901385 0x52bfe529e673595d0b8fd52f4b82f750ea3b3516 0x88442961c20c6b92bf688492ec4e1f69755ad15c 0xd73b05be98b2f4b4247ee14200b2c4a117064504 0xa1ff90c860010642c6d230f2ee28aa2a03bfb5d1 0x42b65d719cf2bce04f785705e0658026b67ac0de 0xa2447b2962f916da6172d58c31b27f44abe1ea38 0x69232e98819f7ac4875d0aba5d36bdf74ab1435e 0xca26bf2d5fe29ae0799c084240b430b2343a3646 0x3390492b0f9066e70d680ea362b6d1f768260e2a 0x4dc14987e072315686accbe66503740a4c47329f
