ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-83773ACB3E29
|
Infrastructure Scan
ADDRESS: 0xfe878fe93741c04abf9f7b8993d8da99996a80e1
DEPLOYED: 2026-05-14 20:55:11
LAST_TX: 2026-05-14 21:25:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Pulling contract state from Alchemy RPC… [FETCH] Metadata hash (IPFS): 332c1873…942f2b60… [SCAN] Running static analysis on JUMP instructions… [MEM] Initializing storage slot tracker… [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Simulation completed. No state corruption detected. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Cross-checking with blacklist database… CLEAN. $line = str_replace(‘332c1873…942f2b60’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x474ff4dbd78865aefec572cdd3c82b24f6290154 0x0667df60023c5b56968be04f039e63aff1e01cc4 0xff9c9b7445525ccf3b30dcfdf6983fa07e064aef 0xa1aa29447e7782d5e6e5314a214d0bb3e79851e3 0x2328d68ae5249cd2d74a8537a26f68aa41c2ce65 0xc02a1e3e7488bbcb461ecbf62ec622ab79153801 0xecc1a71712274b08453f5843a44a4dfe28c50d94 0xf328580893c6822fe40e83f63bb3a15c71186740 0xd2e09c43da614ae92b46a403a7708cad2f0f6a61 0xeba3073c447edebfb326104f8e7dbf37da955a4a 0xa8b1e768ab237ba2eebc2e418633372cd4d03ffc 0x90341b75815e7cf8a4eb8dc8ad1d9b6c4d2d9bd9 0xf89c3126117f968e85976b9ed79158af8997ff1d 0x0e4528dda65dfbc90a46cfaa202bf080195ee71c 0x0a3bc1fa85232af8f669b9988ffe705505973c2a 0xa90fe8280028373216cac27b57402272f8c466fb 0xaf67a9624ba7530489d74f08085b7752b2c08300 0xa336528a204927b01a58e43ce4292657fba5dcee 0x1162b88ced7c2d6b5c91b59c376c11b837ae8d6e 0x0cdf23f3c300a8b0bc104e607079ccae4c205311