ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-280987235CB0
|
Infrastructure Scan
ADDRESS: 0x1354e94ee694a8ebbb463374f21bcee5a29296eb
DEPLOYED: 2026-04-28 16:34:59
LAST_TX: 2026-05-03 10:53:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Reconstructing ABI from function selectors… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Snapshotting EVM state before execution… [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Simulation completed. No state corruption detected. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Finalizing audit report for 0x1354e94ee694a8ebbb463374f21bcee5a29296eb. [DONE] Report exported to IPFS: 05ac2785…7f2375f8.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x1733f379a1317fe3cea48243a8f0093521d5014a 0xca1f36b6779f732456e5af09d5e59cdd56136d74 0xd2e1fcd6edd46b200b4b8c91e1f7d774280ef277 0xca8345749fc685d897548b3339deb5e2c5b25adc 0xd6cf419e5ec5816b903643bc3e8a88033e7d7003 0x5ca7a6dca0c64dbeda1696ff2d91c73eb3bdd83e 0x10b2b342111cf1f45f5c0ab2f3c1055549fe0a22 0xf8e2d301ecfa8493cb7cff1dea0de1a220b0ba29 0x61ee907c3a2f574a092ec13f152a3740b2ef33b6 0xbc688ee3adaf0a9d90bc46481e78b1b7bc266a7b 0x95fdbded180836d0f5fc5a5976dafee6e1073dbb 0x9cb89ae1572bec6bf262dde7819b305d6d4132c8 0x861671c4e60e5dfdb4e9bb2252a1c2e586b95c09 0xdc750769e47f29569c8f7d154e061d4ad093b750 0x7565f8f24a6f8f272f1e0556309f096982a8dd83 0x5bec4be99a03a9b9502ebb537af6eae4bcb310cb 0x9f59de15f7e479debd551e5cb44de5265ab0ae3c 0x06c630fe5e690487e37a55c5d393eb2232cd7a0a 0x7e805593e3778bd3b2a56d81fcd1cdff7fac5829 0x8b75f978f1c98809945940706f124c634e1ab368