ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-1D05B9CC3B21
|
Infrastructure Scan
ADDRESS: 0xe0b93274bdacf7fbcac4eabede45914823221ab4
DEPLOYED: 2026-04-23 06:24:23
LAST_TX: 2026-04-30 02:57:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Identifying function signatures (0x886c7913). [MEM] Initializing storage slot tracker… [VULN] Probing admin methods for ’Access Control’ flaws. [SIM] Executing dry-run for ’transferFrom’ method… [TRACE] Stack trace saved to /logs/TRD-3AC8FE69.log. [VALID] No critical memory leaks during simulation. [DONE] Disconnecting from Ethereum node…
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x7eeb5733bd60decab06fe64ed52923998824297f 0xbbfbf0ce667774e83f6bb13c794fa8e1d291b1d1 0x88e212f73fc8ecc6f460169e5b1d56246288d103 0x9d4e43d733617340b3c3c13577f507fb8da49632 0x92e073b9ab79ede1e89f42b96f24eef3ca445698 0x4214c6bca69767cb2245c164d07d47e910b2148e 0x53f9c3c07714025feb8acefa9284d811614d0627 0x9790f1dc4096ce31a56ef3384b0ef153779e5227 0x1322432e0fc4dfbc88cd27e08c86fc6c30b2ab29 0x8bf6e4719179e43e5608c12cc035dc2ed321a729 0xeabd652eeadf437c1ca8f5849b60720efbcca12e 0xc94589ad61ba93429313b18a56166c463dde2b9a 0x0b6ba110a1fb98ee0167775a6d72a2d05d971447 0xe204eba6e040c4935c38c673082d3bf06949a32e 0x9aacf18744f080888cef4617c29885984a38fc18 0x99e980265bf36516c442be982df1772a6ccb3233 0x48c6ad5f829d4c7d535ec0c0d0103d21a96c46d3 0x2ff50b8b4bb56394dea0c3d719bec0e9395368e2 0x864b48a38889fa39bbcc26e248f5e5592a62cb49 0x75d9ef48e30bcb0b658c1d387233fb52ebf9a4fe
