ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-398DB7CA4BD4
|
Infrastructure Scan
ADDRESS: 0xe83a5c824add68255ccfffb53987f4c3201cb1d1
DEPLOYED: 2026-05-01 17:50:47
LAST_TX: 2026-05-01 18:50:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Connection established. Peer count: 46. [FETCH] Loading bytecode into isolated sandbox… [SCAN] Running static analysis on JUMP instructions… [MEM] Simulation buffer: 1024 KB allocated. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x99e48fc03a369497f7bbe0c2c196cf4c4442a792 0x263800086cc73cf3113f5077adcfdc6bef1c741a 0x09a8c1dae4090052551d0c892964c77935453d53 0xd0b21f18fd06d085d19d0e4c4813c8adf47aface 0x00e610bc4e73a6ab3e8703f03bd13e0a8b2e7619 0x723dfad5ba9a85b82b12c97f03e77473e7f83747 0x1595a5393c9deb74c0eeff01d7c05d5b85e5707c 0x86337572fda1f96ff7f2868714b8a4f3e95dbe2b 0x3dbb9fb49142dc31ef872b7c4ef60f33b8aa77f5 0x7d849cee89f563204af8b8e58fbeba13d18e57ae 0x11d8201747e5ccd267db6ca990739f373f1db6a6 0xb437c413c54bb06c3a6cfaa36edc1510231a6171 0x02b17c1b70d2eec4a40bdace147edcf1c0764714 0x9077f048dd4759a1224b030d1623290c80f79596 0x1c9d7c53ab7f3fd1aa02cef173906980a875aa48 0x668ed2973b71acf3c8ddb6876a44507128f7a105 0x495ec29ddaa018a6287a173a9e7efb1fc8e22637 0x56c76a1f72d7581741eda77bde4f7c4c4bbe8f06 0x94519a1ed0bfc95847868d3aba9a19ea595ebca8 0xe1b25c32d1f888cdbabb71cde3c465b479e5556f