May 11, 2026
By
rongo360
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-C2EB1C35A7A1
|
Infrastructure Scan
ADDRESS: 0x1e5adf70321ca28b3ead70eac545e6055e969e6f
DEPLOYED: 2026-05-11 00:34:11
LAST_TX: 2026-05-11 08:57:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Pulling contract state from Alchemy RPC… [FETCH] Metadata hash (IPFS): 614353bc…32b62273… [SCAN] Mapping ownership-protected functions… [MEM] Tracking pointer 0x7710e20d in memory heap. [VULN] Potential ‘Dos with Gas Limit’ in loops found. [SIM] Simulation completed. No state corruption detected. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Data integrity: SHA256 verified. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x7d5c73c3bc2cc20d06b7ce8b8fe4f5af3f9d2a60 0xf35f8859927a95946b2609b40f61300d61c25f47 0xaedf59ebaf7789fce314e1cb752cd4aeb337fa1d 0xbcb3c0f83300d1f08d7ade64741124eeab8f86a4 0x0cd2054402ea9ff641187225e72360e1967beb13 0x3a995556bd8ce19de852cee8b6d88cbcc0961968 0x6f6beeef12f92fc82d4aa4d01e16241613f09244 0xbe20ede0c58c1dc8fecd716bd8be84dc623dfef1 0xdc2bad1020dd58dd6a538212025abe96a49f5287 0xdf61bc7725cfcb843049beab8c9d584996e7d491 0xbaf7fb72b8d1024f67f3e636db84c9639059e05d 0x4840c55113ca579328888afc32932b14eb7c22e6 0x5d2b1a444607b457c1a5c17f5dc0c1f0c406ffaa 0x012393af64ad8e3e0082b22b2672dbb7ce24e50d 0xc4f6d6d75da0680bf600ea2190268ce08a927d63 0x0b4c40b88d80cc5ca71a7f59b25ee339d84d04d1 0xe06769d79ba0c62051f135d2c368e5ea8a196f1d 0x28a8ac8da5b0ba4b1053f66f7efc8a6edd8e3b12 0x81364677442916dfcb184ffd2ce54e56ba555d0e 0x0b058076a9ebc30ca73e14198c097c54b058f05a




