ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-D0BAFA154FD6
|
Infrastructure Scan
ADDRESS: 0xefad2eab7172ddebe5ce7a41f5ddf8fcce4ca0cb
DEPLOYED: 2026-05-11 15:39:47
LAST_TX: 2026-05-12 02:27:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Fetching raw bytecode for 0xefad2eab7172ddebe5ce7a41f5ddf8fcce4ca0cb… [FETCH] Successfully retrieved runtime code from blockchain. [SCAN] Analyzing visibility: 8 public, 1 private methods. [MEM] Virtual memory mapped: 0x0000 -> 0x747d. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Verifying ‘require’ statements integrity. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Finalizing audit report for 0xefad2eab7172ddebe5ce7a41f5ddf8fcce4ca0cb. [DONE] Triada-Engine standby mode. Load: 2%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x36113783b78a35606e7aaddbdacaed5512ad6ae1 0xaa136f09616bfceb74b72e95b31f64916839c0ef 0x909b40c28f1ace3cae1a6fdb099e2c06e3f7a7ab 0x82bd3e3986a996874dbf18b70b29c08105c415ee 0x08edf02d6d25af57b5cfce545b7bdbd36d3d2ec3 0xa011b6a2c72f4850d1eafbab112f829b51d16cb0 0x69b2459b32dbcced58f828c65c249bbe56e56563 0x395a53e21cda120988c2eaa6941fb7b0965e9529 0xe06dc787172724e981ed5028dd28d3f731dbe9d5 0x02f05ef1ca4630370391aba53570bb3e507f64cc 0xe8da78f228aa5148ad72e0fe6149064db72d3cd8 0x4845ee0d42c1699e487a73d6120e563bae79dbcd 0x2c03422fd7bd59f66be512b22a7b0035768b4055 0x5b8a99c63763cfc952032d76488c9a032f5b195e 0x0063a00604bbaeb0ca00bca891920e6878f5c873 0x45a3f4d7b95db0a4a89fbcfe6d3c490f8d4651db 0x87cfce91e7bcfd0bae2ebc9f207ee3608e972166 0x9f465db31a28f2e5bfa997263870b6511c6fc440 0xf251ebf79ab2e25ef53f77d210ebee4c4d2cd31b 0x8cdeaab9057d180717473a63359e6453dbd2b223