ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-6C12FEBC4565
|
Infrastructure Scan
ADDRESS: 0xd915b5d8839eb02ccc50b59f7feb732e7201ac83
DEPLOYED: 2026-04-29 04:38:35
LAST_TX: 2026-04-29 06:38:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Entry point found at offset 0x65c2. [SCAN] Detecting compiler version: v0.8.68. [MEM] Virtual memory mapped: 0x0000 -> 0x87ce. [VULN] Probing admin methods for ’Access Control’ flaws. [SIM] Executing dry-run for ’transferFrom’ method… [TRACE] Return data: 0x56d7f165… [VALID] Comparing result with Triada-Security-Standard. [DONE] Report exported to IPFS: a8be52d1…3fe64f08.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x0b8bcd161e162913f413e60dee0a356e5d5eee0f 0x3c0b46c43190ee798920da9d25cb0b218ade96ed 0x0f37f8f39d0cb04a48679312eaf902159bdca9c5 0xdf2d49a0c8e4d57b6c6accb2394c1c772b3204c3 0x60df35420a20c28135ff2fa5a68fc506d91fa6b8 0x161af6c9bb37ea00fc168e9f7923fec1947bf37b 0xbd2b5ce14b6785a52cd2490080ea8fdba26bb8f2 0x74a8694b22f98522a60843db454b7f32078ff5a2 0x0c4bc44e96788dce571d9e255423de47f7e126cd 0x64e1a5869f7eb22d8207b84c3fc39dcc6cf04e31 0xc97a29651887360cab249ba67c547166ef6b0fb9 0x53be2e17d1091672e6a4d08d738279ee181bc0c8 0x0b7b1c7e991fa4945a9ec23d7c5cdbb3f4572a94 0x93f9a14ef0701b5c10441baf1f6e23f5c6dbf914 0x45085bec484f961fa473e1fe5580c60cabd35353 0x35adc3c5da478dc09c99dce508b8dadf8197c260 0x9601d05bf9fe1c0defe443fa7516ea2b94634e84 0xfc2a2b57dedae735eae526fb671724e5f8cd956b 0x23213cebc811c7642621bd72279343ae3431f187 0x790d639b96fd3421b540b05ceb0727229ec54160
