ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-47D0ECB3619E
|
Infrastructure Scan
ADDRESS: 0x33cb74c17ad79426a9733a7e6ac04bab063d004c
DEPLOYED: 2026-04-28 10:36:35
LAST_TX: 2026-04-30 08:33:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Fetching raw bytecode for 0x33cb74c17ad79426a9733a7e6ac04bab063d004c… [FETCH] Entry point found at offset 0xd228. [SCAN] Analyzing visibility: 7 public, 8 private methods. [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Mocking MSG.SENDER as 0xbe6058477928ea400a34aecb18ee35dca569abc5. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Generating cryptographic proof of scan… [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xca576d96aa014edacb4b522f8271fdd8758e44d1 0x07a7600761471c10ae9456368b680dad694b20b3 0xde41399145f23936b03dd1474ec16c1519c0dc2a 0xc70986c4595bd5a8821f925d003d82a0445c2c42 0xdae4928f51ab7119a1d974aab582f560a2e00d58 0x878cc839d768b629d921e03886f95fdbcdb5cfb2 0xc082dc93201e48da04ad1157691991aefca4d7f6 0xca6f67ae992cd6440fdfc36d7770ccf1045700fe 0x16abef11ed2ff491c219f120257fcf1ffd0cbb77 0x9ab6ad487abc21082b9d8041668b7e8d40464985 0x6e633b402cb97ea29d72446fb3fddf8c84aeea94 0xce89e9368527cb2fc171838a16638c409517a891 0x92f4d939f53897de3b50a53d94e6ff45ea34406e 0x9e7ee3d400f5c9336dc9bfb5fcba287f616d31ec 0x3753d4429c67a61bca13f20122ac72bcdd6228a2 0x51f237e730ef8277bc8f468bd4430b7146eb3316 0x2e2d6a80985c546cc6bc1f9603a4295064fe30b2 0x14eacc6c280bf993e2dcfb8810331c329cc10991 0xc078aebc4c0c4fbb9477a5e55e9e65c975d1d93f 0x9d75a9ce7002a1c2127387ee7183ccd95b6f4838