ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-46DF5C8DB960
|
Infrastructure Scan
ADDRESS: 0xedd4dab3f0c55a0806ee538feb5f512c5158b9db
DEPLOYED: 2026-05-14 00:51:35
LAST_TX: 2026-05-14 01:31:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT
EXPOSURE: Unset_Security_Flags
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately!
|
> Execution_Trace_Log
[SYSTEM] System integrity check: 100% OK. Initializing scan. [NET] Mapping peer nodes for transaction trace… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Running static analysis on JUMP instructions… [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Warning: IS_DEBUG_MODE found in storage slot 78. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Call sequence: 28c0 -> a5d4 -> d427. [VALID] Generating cryptographic proof of scan… [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x7ee031499ccfd942c383b337c223f1b12857008f 0x19cdc89f54071aa5a90ca2ae3f89bd28612fc871 0x12f629b627d8538a8d14c950ecda9d602486c0a9 0x1521e40b37228f7d3a944fd305c345c5fc5ae027 0x77a7092f8f241c97469ca82374567911a7aac2aa 0x7fc0d39648bb56c99d776822c18d62d58605388a 0x4e7bed3e32cfdf74041e76d745f99d47db082e43 0x0797a90886ede11f0d644fc3fa906ebcdf4cc6d9 0x01f268ccdcbaf9ca549089d3fec8ecc541933c34 0x4bdde891aa6bb8f94d014bbd7bd5eca3fd54e9bb 0x5769895ae76bb6d65cc8a6a49373fb767b1de34b 0xfcccced9a217fcde71327a936b4780dc0ef236c8 0x45730f07928fac6e1c74c9ca56223ed6426a9abe 0x888d757fcacd0076da435917f3ceb6803730d5c8 0x5bcf9d80c8dd0dc9b04362b0f201b2dd2b6896c9 0x7fb02d0f1e3fcf2e295f4d2462c178a4496f32e8 0x7af4847208633d71109a7f093ec6c0781357c1af 0xc6f22e6d4850cdadbd6efd603e79f1069ac9a7bc 0x57d1d44e2ccde551d9f6d0f61efc94c50357636e 0x539943bd490fa326f6ce59f409dfa4ecd54689b3