ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-23FBBAFBB5EA
|
Infrastructure Scan
ADDRESS: 0xf86bef21a047718400d9c66b8fba51671dfaafcc
DEPLOYED: 2026-05-05 18:09:47
LAST_TX: 2026-05-05 18:29:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Handshake with node 0x44d48fbe successful. [FETCH] Bytecode size: 4354 bytes. [SCAN] Mapping ownership-protected functions… [MEM] Simulation buffer: 1024 KB allocated. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Program Counter (PC) synchronized at 7457. [VALID] Finalizing audit report for 0xf86bef21a047718400d9c66b8fba51671dfaafcc. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xe5be37584f1c6342209043b1ee39b2c01dc2c944 0x9da155e06136dc123f2d42eacb396f5b207ce45c 0x12ae2fbd9a2cfc797c0a0d002b1bbc5c7c930fbe 0x457f03106ca8f122f5f174c9299dc509db9ad305 0x16e908d544159a8076e05c08e7223bb91b83fb83 0x3111d7ae244f1ae8e394797cee5dfdbafd0b15a0 0x2bbdefbebefc2810b9bb47d5cae7c9cf4ec87262 0x7af408e332e717ee68e96eb78b6fc0af854b5e09 0x95e2c672aeea71ae7a1b2058cf9de63b7261c7ca 0x5854bc9848486282de4723077433a36c7491e9bf 0xa95da3a380db95f123c6b674f701b780c3166892 0xa727e89ae172f5c3f1c4817f2b48b905f9b7c727 0x7aaa967c446633ac8e80fc10752430c089b9c58e 0x074be8042058c22fd0a3c16327b570159ac7a7c1 0x9a856928f1eb38805dbf420da496fc381f7ebe86 0x8a7000a1f3c8d5b2e151ed63badd80d356559347 0x5aabe57957cf0a721af726d5eb6e965ad7c1ae23 0x51407137ea804d5dabfedab1b6821bebf3ed1d8b 0x84d960ab0090cdea3f2672dbd154408ee5a48e52 0x9fea611ed8ed975209d192b6a17ab085e7b1ac29

