ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-DDFED08B85C3
|
Infrastructure Scan
ADDRESS: 0x870dc345966a2074deaf615ed3018722f41ef2c7
DEPLOYED: 2026-05-01 00:50:47
LAST_TX: 2026-05-03 02:14:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
â—ˆ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connection established. Peer count: 17. [FETCH] Reconstructing ABI from function selectors… [SCAN] Checking ‘immutable’ variables and constants… [MEM] Simulation buffer: 1024 KB allocated. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] No critical memory leaks during simulation. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x0146c6d66613d43bb177ce2bfd0d46473c12afd2 0xd7a3b08abdd9c538a0cce8b0a6b8b025426a513d 0xb0360d2ab0870789cac91ad5a25312279bba4749 0x191d6b8edd19167e90419347d586081e2b01d8dd 0x9b6b9b47d7eebf315b97522a37c32f166e1c2fbe 0x1000d8cee2e0e807d016a1f44b7288dee9553786 0xc7fd03ad1f7d1cd5d1b32da8936f7951bba0165d 0x99d50597be38e3f0adcad30622ac27d2c70aaa4e 0x14670033fe4dbb7279539650bac68815f52c1b02 0xb859bd988fa507f9c245a357ca7ddfff2129013f 0xb40a4b70742b7bc896e1b1ba47cbb250ac86e4e2 0x1d76dac5a7aa1788ff6622e506fef0fc92612934 0x7cce3e3229beb2ae311000cac7d5b721570ebf5a 0x06979d8f8d2c5163b029fca37933230c6d613a6a 0x91d37f258dba96499003439498695a37ce7c40c3 0x369f2aa8374f36ac330fc854aedf6b91b394ce3e 0x07978693c01f70373e89d196dfcfca18a6c02d6c 0x6dcfe3e535a4d40f64589af0193e3198049cd141 0x610ca3907d02031d0b584ee9a167ab922bc67b7e 0xe9287c0a1c0bf3d5b3be01efb497502b51befcdc