ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-25F8C4854D0B
|
Infrastructure Scan
ADDRESS: 0x1d31c18bf24270db4c955e9b722935ed249050a0
DEPLOYED: 2026-05-06 10:33:23
LAST_TX: 2026-05-06 10:49:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Connection established. Peer count: 95. [FETCH] Reconstructing ABI from function selectors… [SCAN] Mapping internal logic flow and branching. [MEM] Simulation buffer: 1024 KB allocated. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Program Counter (PC) synchronized at 3239. [VALID] Generating cryptographic proof of scan… [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xfdc38ebb7cb7326707ae7cb51b2ef4e949c65347 0xdab222545b9295db32d5e90a8198972f7b6599ab 0x9ff56b486ceceacb3b7ff8e538bee4ce0992f7b3 0xacde33676ae3c092a44d63025a09a80bac0aced0 0x959f57899a2f3e1cbb9097d5d1e0fcb5ec41b9fe 0x3a8f33e7982b8761a6023ae9a9c53e7cccc1c872 0xa65064724d7784643e7e2f51ce8ce780e837f1a1 0x83b5664706c52aa6fa003a316ee8ca0d23d88ef0 0x654b8f83e93267d1ae676fd93b82925a767120bf 0xaab0043516b7eea650875b48f100c18072ab394d 0x17f1441acd8d6827d39f5aec81be9bc9d93e7286 0x1e0044040eb290ce4b4154f811f50863d9243115 0x3e158e3cd926402e29c60885667685e2eb5ea42f 0x8107fb04f00a8b0936a6403b8d138adac169c902 0xf42adfc3399096451562a2c03d8af766cc46a060 0xe2c3536f9428e973322c4af7ac08d18087974e2b 0xfc7c117ad317a7db04c99cadcc21baa994bbb05d 0x8b9d243e52a490d1a4d5b219acdfcaaaeb639cd2 0x53526f214419b40127da06f37d4206078fb49424 0x3711838f0a8b51448072ffb7c562a059e04fe8d2
