ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-C4C2F44BF0E0
|
Infrastructure Scan
ADDRESS: 0xa4a934fb3fc568b6054144ada1dd91450396489f
DEPLOYED: 2026-04-23 14:29:35
LAST_TX: 2026-04-23 22:27:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Metadata hash (IPFS): 8bb62f57…d459bcef… [SCAN] Identifying function signatures (0x829ae323). [MEM] Stack depth: 6 / 1024. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Return data: 0x79d36ff1… [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xadd36a1645967d94a3ffebfbace2e659ca517d02 0x4bbe217a9adfccbe75d9f3a9dec66c395750401b 0x8325bfb716deb30f3640c3dc68746c75dfc2a2dd 0x6ddc66cf8903454ff98cf4a9418d0c77c7477176 0x585f482c93843486620fa80e058669604a6d1b30 0x7ff440caee634d739d824a922558d9fb193e9fb2 0xba7ccb9120be0fa66af57fec26137332f4f79afc 0x1bc7e4a46ede4c984035ed0814a47388ee382694 0xf162abfcbea8941fdbf96388f2169f739c878296 0x6d5836d3a533991c29305d889067f2602ed39d61 0xe051a12d5d1b4066c2c7b944e3164ba174f3e7c3 0xd52bd3e2d378090d916c6163318b5390e1d9c246 0x1b2e4f0165c20624ac5f59a059e32c77d8e49b2f 0x4bbb605fcc745bfcffc76627f2492fa0aa3c7b37 0x23cfcf31ec7e61253cfce79f9afe385dc36f8f10 0xefec9c5bf5ca8ae122fa9db578ecb150efefb748 0xa29b1250e55489707af48b2ddeda249465861c9f 0xd9d8ab3e28232d12573fb091dde3a0b68b15a7b8 0xcd998bcfba842a1dba53d07832ad5745393bb29d 0x746815e9839b4ee5544125edae757d73bb139081
