ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-823DEA54F564
| Infrastructure Scan ADDRESS: 0x325c3eaa282f0065722a748794776d8eee244fd7 DEPLOYED: 2026-05-09 10:31:47 LAST_TX: 2026-05-09 15:21:47 | Compliance Status STATUS: OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate VISIBILITY: ADMIN_ACCESS_VULNERABILITY |
◈ OWNER_PRIVILEGE_EXPOSURE An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! | > Execution_Trace_Log [SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Requesting storage slots for offset 0x00… [FETCH] Successfully retrieved runtime code from blockchain. [SCAN] Detecting compiler version: v0.8.39. [MEM] Allocating stack frame for EVM simulation… [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Mocking MSG.SENDER as 0x8d8353f812573b9f4e2a096fafd04ab6d6a00c56. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] No critical memory leaks during simulation. [DONE] Triada-Engine standby mode. Load: 9%. |
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x4051d02e7cf069b5a081b7322929fcda122a18c6 0xcad47bdb4ede77a738059eba3b33c7eed7024644 0x159a9d29bb1e1f08ac087e7afb4eed62c2b5e551 0x39f0e8e5bb548707c28795706334469ca7be4b63 0xa676f08ef323183b20da80aa094ef34b5c0eb6a2 0x5424ee6b4986291f7299a1974afe0a7454eadcbf 0xa72131485b939f2ecd52e3dddf0b1b300a7434b1 0xb9184093eb6435ccc7aee62814aec1b1b08690f9 0x034d6babbb067eee4a67357b687c9b1267aea1ce 0xe4645fd8970ed918d1b344d91496f198b21a3590 0xc958c9cb70ca83d55d27afde38698857c09cd92f 0x041d95c0b6630f28e2f4a0f3f450ecd7cdcf83fd 0xfd78d9842b83e659d2b98573e1cec7e63d57f851 0x72c38c803161d34afb48a9e2b9ec33d78556d382 0x2e32b356829ee722dfc3a83d0e8370433ec352ec 0x07f8ee4c35678ce97cec6dea6543a325bdd42e9c 0x61ed679d7a35f97a7698795749530142a29cfe07 0x2b83b685d4f6f7a127a5f2dc9efccbd5414480a3 0xd20524724b10c354506b20847ed3ce070591c4a6 0xee1766937876c13e99d24ca40a023da1233a1f25