ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-D1646924C0BE
|
Infrastructure Scan
ADDRESS: 0x20ea861b3acec90d3a15b4755d9a1cf1f161496e
DEPLOYED: 2026-05-10 02:23:35
LAST_TX: 2026-05-10 03:32:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Requesting storage slots for offset 0x00… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Checking ‘immutable’ variables and constants… [MEM] Tracking pointer 0x282a05cb in memory heap. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Call sequence: c259 -> 8e36 -> 1f11. [VALID] Data integrity: SHA256 verified. [DONE] Scan task 6E069E27 finished in 72s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x82a9dfaabfea2befa8684156d9c407d4e32dc50e 0x9ef24560b03ecbe8e26f86bac47feb5fda6e2e1b 0xc97b769cd0b9412e68392c18c8ceb1816ef14f47 0x11b4cd663be9978ba1946f97f7a1a9c990712048 0x3ea7ea642952526642dead65b9123e445448b4fa 0xfe5ab8e23e0e9a7fe61f92d686e7594625c1752e 0xe85057124da8f1217a6aac938bba90c4c33bb37d 0xe6988aaa6fc27649eef1d0af1b5e50ef933d9ec7 0x9c3ff21e253b230b94bca4a9c1583eecdef520c5 0xe084f1f15c6c3a97e26623fd3589d635e56eab1d 0x2205df613847b1dab2ba52e6f753c1178349072d 0xd7ae98285461e145f76f8ee4127e353832aa19c9 0xfe936bc04a94b1a96a45cc1c8ff786ec403f21f7 0xcfbbfd5deaa69ac632cfef80fcce21c6d3cf4539 0xaf6ac4b8a7e6bb81af876409f35f542ed144e8eb 0xc50aa9d4cbff20401a2c0cf686564811c05bd195 0xbcefc3492991ebe1594b12dd6fe748ea9a375bbc 0xd9c6b2992f165dc011b39fd30608d8b5a0a03b02 0x80f9e0e944413b8e73a70176f636b465f9e42b3e 0x584ed81cdc472b1a694b790f6af9ade7a4f8c0fa
