ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-146914D4B481
|
Infrastructure Scan
ADDRESS: 0xe075f0978f5d1cb72133c285a38ed9c3ca97e58b
DEPLOYED: 2026-04-27 14:33:23
LAST_TX: 2026-04-27 15:13:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] System integrity check: 100% OK. Initializing scan. [NET] Latency: 89ms. Protocol: JSON-RPC 2.0. [FETCH] Reconstructing ABI from function selectors… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Virtual memory mapped: 0x0000 -> 0x9df0. [VULN] Warning: IS_DEBUG_MODE found in storage slot 82. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Stack trace saved to /logs/TRD-8C7047A5.log. [VALID] Generating cryptographic proof of scan… $line = str_replace(‘0x1b016f9705e1551a6f7af588a123b8b43f10d3be’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x25138d10837ab0278eb860454e1045f2b92929ab 0x8853ff1a334fb8b205636595e12955564428c68e 0x8df902e48cd1a82b1ec2b503b86c16ca52ad5080 0x03f9ad8f673ce35636bc03e219cc36305f9b6e8e 0x4c41587ee5790dd63cdb70d250fdc5b7888e5082 0xa9351d37efc5523057d63c87bafb1a4e01a66f56 0x77170db2442a6a839f059c8dbadb0570b8562473 0x7cdfb573838cab0bd40f5d4c254aa336a3f3332b 0x93acdf79d369fdcf1e6fe5f30a2630c01d80bae1 0x54b3ca8e727a19db9cac4c84a93d79356da31e1c 0x811ae87b99740d607cbb08a3c7a2aadd67143667 0x577afd0ec73700b6f4b2f1a062622e740e582752 0xf4aac1638a01c9d511909269278b2c786e604846 0xb336a0b6312001ba550b7e85b6f8145dd46fda31 0xe4015dabc74725544b398f9637e020c586f9081b 0x0d0c6c4f644c89c545f0e4bbe9a068e5c5aed353 0x8ebce5c06a82e6d899c8758aa18a373390b74204 0x9568556ffeab54f415385e9b90ce3240719b2846 0xe3cccc0ceafc25908820d12ac5ecf7a286b2f024 0x9f1a6a5cba35c547ad655d2a59ed6c7bd4fc0ef6