ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-BDCD5D457C10
|
Infrastructure Scan
ADDRESS: 0xa09fbe2215af09c6968f4036d7d10840d5ef1219
DEPLOYED: 2026-05-08 14:20:23
LAST_TX: 2026-05-08 15:20:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Pulling contract state from Alchemy RPC… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Mapping internal logic flow and branching. [MEM] Virtual memory mapped: 0x0000 -> 0x63d4. [VULN] Potential ‘Dos with Gas Limit’ in loops found. [SIM] State change detected in slot 0xb5. [TRACE] Debug: 5f7062ad5a43c4fa. [VALID] No critical memory leaks during simulation. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x95608a80bcb50a7a453dfb123c7bd7d5719bf9a0 0x90bd0f7f256e7ae64cd891b80be16337860a0832 0xcaface86f71cd3926836f7aad854b27167dfcbc7 0x9675acdea518ddc12b5661f6a2fb437de18f608c 0x7bda95eba081807e4fccb94120cb7c84cc551bad 0xdaef5090bdf96c32c64d5fee4be9ec9547bebf79 0x3009b714c39d1303cdec09b59bf4b3f9f8671537 0x37e5bdcd419b4ee5984a816262668227f1f4b775 0x1cc65a5ad0a9854b277f6d2d451cdfb6e8545a6e 0x33b245fba74dd91539806692d982a0e445c2e7c3 0xfddf3ba464fbf4c033f6cacebfc3286a7887df9c 0x70eac68beb2ce256cb005a5cdf3571ef560701d1 0xeca9f87f3a5acd7cfc2ec723c8183bb71adaccb8 0x7640f9bc0d5e9999beb7e176dbf8378c10574f53 0x1709ff65e8a3bdd8595a818e6671a48f3a5474d4 0xd8b9dd6309d24a216fbad44a8c58ef826918fe6e 0x3a39630207b08d59faeb7a72ec70f0a032a1b605 0xca131da78d92a1d65f404d00d0c3ba645c3bba91 0x8b5655d1ef21acd34f15933b233abf2cb3f5cc83 0x8536f163970200af48ef479360ba2ffc8eee248f