ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-26E7326C067C
|
Infrastructure Scan
ADDRESS: 0x4e334a21f58fa9a983360acc8ddb1c198a68689b
DEPLOYED: 2026-05-12 22:38:59
LAST_TX: 2026-05-13 11:37:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT
EXPOSURE: Verbose_Error_Handling
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately!
|
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: C1CAB340. [NET] Latency: 49ms. Protocol: JSON-RPC 2.0. [FETCH] Entry point found at offset 0x6c6d. [SCAN] Detecting compiler version: v0.8.37. [MEM] Initializing storage slot tracker… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Call sequence: f3c7 -> af56 -> 035a. [VALID] Security status: DEEP_CORE scan finished. [DONE] Triada-Engine standby mode. Load: 8%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xe1d44d7b7257cdac8376d66464a2537d7a84edce 0x2b2f88a3847a46788c5f652be8ec5ac3778f0435 0xc9fc51e094876cacdf981cce44ba793aeee92150 0xd0664a7c8baa67956a7e2320ea1d3afbd84ef125 0x5da0f18b32d63e3e393a2a57ed75ed2d4d1baa15 0xaa57c47e03e1695e30668d32975be5351fa4bac9 0x126cae061a8dc9f5c6d7f1f99847e9d63c7cf26a 0x10eba38db79b39617a9304a20670d037a9849d39 0x94fb40391e80b91bc4121dd7e2a5858d2ff78b14 0x15ce782266df93fc760307883eeeb56fc2fe681e 0xaff4f15a2aa16adfa395694587d75cd8b20db3ed 0x76265fc8638a6a579f0a3e8986b13cd3840c45d7 0x0d1dede6210335b4e76530ce8e6fee802029344a 0xfb5a81b3e51589b562f9848aca0e5b14099a311a 0x4e6612735b30bbcbcc1f3c0c89d123caf0f92421 0x9be08715f41910ce7d41635829be6e43e651d7cb 0x8da3d5dd3af7121a2edd215f7df8d28d69deab1d 0xd4524e4ce8d7280e9f7884de1de4082baaf4121b 0x586303d7e44e658ddcba1e6cbb47ffdf1140a13e 0x3fdc9c0f0b8ae432b675ba3546c6252086835894