ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-601D582E4D74
|
Infrastructure Scan
ADDRESS: 0xb9f898bc2210ea3552002721116a6fe9fde46824
DEPLOYED: 2026-04-23 12:26:59
LAST_TX: 2026-04-29 15:46:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Core initialized. Checking license for cluster-node-5. [NET] Mapping peer nodes for transaction trace… [FETCH] Reconstructing ABI from function selectors… [SCAN] Running static analysis on JUMP instructions… [MEM] Virtual memory mapped: 0x0000 -> 0x76ac. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Consensus reached on node cluster: 7/10. $line = str_replace(’03e1c18b8515a468871829f57ccdbc062e086485ff4711f703bfd7b02768f38f’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x0d80e382ba19d0dba492e9c651a9b9a9d779766e 0xd6f8b75dc7546dc47c43421c089075f69dc1fa4b 0xc23588d1d5fe6422b2556cf07b26ca55866914df 0x8f3a7334777fab4aa6bf7196774738faba36a94e 0xdcd7ee2afdcff6ece067967b47fc1734b567e443 0x1f20f03da956408bee6108ee839bf320dd59281c 0x177f609b50ad9c5e6b789f9f51cbd034ed6a5db7 0x56186e767e0076fc8e44708da56ad31150fa2917 0x8a9770e1fc366e003e864ac707d4180719506352 0x70791ec0048b698ee713f66e49614a6860b200b9 0x04c688208141c459063b80946fef4f6e22a446cc 0xc3bd25a19bd259b316e1fe63322d082466c6dc00 0x5ea5b35f41e91825451981cb0aaa9d748f75ffbd 0xf31cd02268c5136d1d0dd0fcbafff2d86305e98d 0x9204a356780fe4cc0239122ce7a3444500b4516e 0xc802019f35a1a94a6dcd6a2476876119e9008e94 0xf6a275d07474809be9500be2784afd5ca7ffb1e9 0x2eeec88bac1aba4e9f9686518eeaa4103e1f19af 0x075a058b85d7b9eabef75575b9ed6f19949861ef 0xd3f0b81cccb3294284cd84ba9cc4b08f38fa4fe2