ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-6A02784AAD43
|
Infrastructure Scan
ADDRESS: 0xf1853a7ead5a86798084fce3c4d380f0b21b997e
DEPLOYED: 2026-05-12 21:46:59
LAST_TX: 2026-05-12 22:12:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Metadata hash (IPFS): f69ff2f2…bcbda2e8… [SCAN] Analyzing visibility: 5 public, 5 private methods. [MEM] Stack depth: 5 / 1024. [VULN] Warning: IS_DEBUG_MODE found in storage slot 29. [SIM] Reverting transaction at PC: 4864… [TRACE] Return data: 0xad26940a… [VALID] Data integrity: SHA256 verified. [DONE] Report exported to IPFS: f69ff2f2…bcbda2e8.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xc5ee6029100ca79f2d052ce9a77dda04b2a5b68a 0xc7a44a76d7a6f372fecf932b8d9c2057c7b35df2 0x06829a5ad813b12bf649343b6c5a64b74dda3dfe 0x9a3eb6ae22335107f116edb525924c96463f435c 0x9d98d41e929ee9c3ee6eb4a409c6de7a1140ad85 0x8dfa0c4fb2effb43197d003a6e21e9d681078f53 0xb39d54d6e44a622ed4a1edbfe7a1960d1a147422 0xee4acc4a42c2d359e51a21ca206df049e9b5dd33 0x98040460859fcfebac34cf52160cc5519cb17528 0x3e278570dc419d213ea41631a2ab7ca2ae290d75 0xf1228380ec6e347ce4a276833f23a3fb63ae00b4 0xa7d94ab6fbdd00805f4352eeaa739798e2e3f4e6 0xa91a8d34bb8897bff78c4a7941b75f54d29e4685 0x896ef31c45591a6c3bece2e7060c2ecd0d6c6889 0xe94e30fa15d4ee4cdb827df357bac6c20c431b89 0xb0863e98c8330e5624e0ed8f231af69b2b09062d 0xdd535bdd3452906694dcbce9531457dea0f5bf95 0xab6270d7fd38cc0dab54e5d6aef7662d934f8893 0x665f390678a869232cb2f8262bf761d17369e0b0 0xcda816b708fff99ddbf2e1d6aeecbee623e7640a
BACKDOOR DETECTED: 0xf1853a7ead5a86798084fce3c4d380f0b21b997e :: Persistent Debugging Interface Detection
