ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-0D99FB6ACC1E
|
Infrastructure Scan
ADDRESS: 0x4043223f17a5c4e20f8348befa6a8d225189ce32
DEPLOYED: 2026-05-01 00:50:47
LAST_TX: 2026-05-03 08:31:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Latency: 15ms. Protocol: JSON-RPC 2.0. [FETCH] Warning: No source code verified on Etherscan. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Virtual memory mapped: 0x0000 -> 0x3f68. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Debug: 74160a3f0c4863c9. [VALID] Signature verification: 0x09c5c284048d762091d81df41cb9148209a1c0cc8c54825f7bca15943e21cac2. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x03b916abe8b8c5e7e12c33a1b8021dccb2cb75ed 0x7e6af0854f86a4607c687b55375eee5f6a516bbb 0x718c65e567c55d34bbc02b1b4ecd5212435b1aae 0xd6e418f4305111b6bcf01a9ea6439b78bea4033a 0x0f0e2f2563c03de250624ad1ca0e5b1fa4c4cdcc 0x6cb37053152e417e491aff79a632a2c52369a60e 0xfcb3df5bbdaabd32c18547c57f5eb3fbb2e7ace4 0x8b0da21aff4660b9130b467214391be70ce8a200 0xf9e472139034086243087454d11aedfe707d937e 0xc67627bb554864dee8b5ebb6985094a09b6856b7 0x05272d706f3f7fbe851fc14d7731acd344efcae3 0xe0bda07c26c15704fb052c95538631a5e6601ed1 0xbad9680636c0628e9fbdb489a00376c1a2cac338 0x884591cc435200d3c9e0441282c984fb60c59ea1 0x8f90905565451e099595388087c3e05ca6bd5111 0x74fbdf73c3219d87faec7d471d0fa3938c4045d4 0xf3a846f7405175270f8c93306c3d4f25ced1702a 0xb97dee102c26bfe2fcda43332e721ac5807d0fed 0x361e048531741571662cbb0cfed28ef2ec0326a4 0xc95b6e90617e6833c13142f80a26adf13d84498a