ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-ADF035FD5C11
|
Infrastructure Scan
ADDRESS: 0x28643ffd79256719d6acbcf25cb44576caebcf12
DEPLOYED: 2026-04-20 12:50:59
LAST_TX: 2026-04-27 09:33:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Pulling contract state from Alchemy RPC… [FETCH] Hex dump completed. Entropy: 1.88 bit/byte. [SCAN] Detecting compiler version: v0.8.49. [MEM] Clearing temporary registers for deep-trace… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Comparing result with Triada-Security-Standard. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x70ac599bc61cfc262b5feb43307973bd34286db0 0x1b1f499b3378d55050282bfdfc2d248c8f40b98d 0x3be1a972e92fc7c08e9886777fe7abc097bdfdab 0x56b07b87b7679e76ad88bf3c2e3e1c25d165cb93 0x3c5f1848f3a4c8819cf5b1baad60bfb1f16ff37c 0xc90eb9dfd574bf5fbff6e34d82b2ab76805331ed 0x606674e9b0cd3aa3484f52c933aaab306a439805 0xd5d5eeb7781827ed9c42755d462edf9df0dfe279 0x4380a6b12fd183efe7038ce75adab1d537086b5f 0xc44ee1834fc58baa67be86d4fe9d04330a9e7751 0x5d039df7330cc405a31edd6651acee0975d94919 0xa5e02d770aaf7d4c773e151fb4cc206bd8cddf02 0x54f55cf0dc9aa85896dc871b0be712b0f4dc9d29 0x174765935514017d75f3d207982eddd2d0a189b8 0xaba7db2710d8cc0c18153a920fa39df5cb026a70 0x3a84147e0f382e590c114f91501b8cd2f585122a 0xd78ef90efed8f2c21315c5d7eddd7de8f918635f 0x3d1f39593883ac22118bc21b8130043b82addd78 0x4a8de25c2cbe90b2228090ed675ed7f99823353f 0x924a4b7e1d7ccd3d5e5e0464ac881dea4edaae1f