April 26, 2026
By
rongo360
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-FC12B0590D85
|
Infrastructure Scan
ADDRESS: 0xa1083ec0fc8aacf92c3694043e64a8d01b5eec65
DEPLOYED: 2026-04-21 13:43:59
LAST_TX: 2026-04-25 21:45:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Pulling contract state from Alchemy RPC… [FETCH] Warning: No source code verified on Etherscan. [SCAN] Analyzing visibility: 3 public, 9 private methods. [MEM] Tracking pointer 0xf0964a0a in memory heap. [VULN] Potential ‘Dos with Gas Limit’ in loops found. [SIM] Mocking MSG.SENDER as 0x9906d08ee9f919d8d87184d4687e018b392bbdd3. [TRACE] Stack trace saved to /logs/TRD-56BDF9B6.log. [VALID] Comparing result with Triada-Security-Standard. [DONE] Report exported to IPFS: 2881b997…8ac32f2d.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xd653a699518d7d0f277bae7ae902b7a265d05e26 0x3a1d6d4a1fba3b222ed1f3f6f5a3a5f274626546 0x527e96f4a24876eff9406ab56ab0b080a1892174 0xb1f6bc314f025c139d1f5415b4f5e48dcb9a4923 0x72ac16ca425f4e1246f491f972afaf97806cb671 0x2b3058feaaeef7663ca40b15730c1e54b9ee6994 0x390f2829ede67ea91892b0ef46724b11532db351 0x09568b22601ef1f72d0f2f42359ce81f2ec9cf4a 0xd676c55b401ca1de380b0b359014bb56404724cb 0x270a1970fe13dda7d8275cd78ed7af62963adec4 0x9dad478f2a7f58dbb442cd7e8bdbc820ab552e47 0x8e87fcd164fed9d8be59507b48996f8b560885f4 0x4378b3474f74b02dadb34566775568c9c0b343e6 0xea61ab8efbf0940b4cac7f5f5960d1b6f5abe28a 0x56110d047a6650b5c7a8238db122e0cfc0f8c68b 0xd150970d5a9d0cf60f61f273a1c7789f5ef6687e 0x775e63352f7f4c4ae10cf3c4f0263b7a90c970cc 0x980764b8616b54d89f7565b1569acd07d2efd065 0xe6d29aee20854eb80d1611198ba772f3033c1c21 0x410317a7b641bedb0d3c732e52718787b3a7b6db




