ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-E48792509505
|
Infrastructure Scan
ADDRESS: 0xafe70a5acd9ed37cf5eb3c92a474eee70cbcde80
DEPLOYED: 2026-05-02 21:13:47
LAST_TX: 2026-05-02 22:29:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Initializing storage slot tracker… [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Mocking MSG.SENDER as 0x24afd761ecbe91e594a6978a34dc580124a25c48. [TRACE] Call sequence: 5878 -> 0f66 -> e91d. [VALID] Consensus reached on node cluster: 7/10. $line = str_replace(‘0x24afd761ecbe91e594a6978a34dc580124a25c48’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x0c0de1a67fe8e2f21db83db62bfe5ae9d5170fbd 0x9ee80cc846a6236b4fb98d75008ab937ae42040f 0xa7745cc1a32871053c23a0ac9d5c2f20e98b31ae 0x5c07672f7a8d12d06f5e997a244036855dd6b050 0x840c9481d31f82fd63a0637e3442c77be967cb4e 0x761dc4a446482d261b8b14cb2f1b9f78d7f966ae 0x259a4e0d7da4dbb96ebf1f77fdd46ed1c89f8a34 0x4b525406b7b1d30e4f47636a0cf7c9592145e581 0x6165b7b6d2d5d3571357b82b055df5a9b4fdda30 0x6b7463ea49396a6df507503d1ee28d016ed7c874 0x8add701cf995f1e03472f748ba7c4087c8a268e9 0x90653f513c7c92e673e501a8cac1f4b4ad44fb70 0x63f1b2ec799f123c02c45d0fa785e394f78db5e7 0xc5adaab0c44762f364c23f394ecf980299e6bd1d 0x0745332d71011997d7e0cc9179a6627487accca6 0x1b4ec027f1e22b3d51fd35b7cf56e97491bdae42 0x4d08f641205d2d21653c7c0ba548e22b8c69a212 0x1d00333907808b0e4dccb09b294f0d8d25dd27fc 0x52a1d4f46baad8b4b12f236c826c5bf0ecf4e2e0 0xea8704fa35aaed86bb19c2bf353f26957513b621