ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-5DEC3C12E2A2
|
Infrastructure Scan
ADDRESS: 0x733ca847b7235b10a14efb6f059ee7fe172f6da6
DEPLOYED: 2026-05-12 20:25:11
LAST_TX: 2026-05-15 23:12:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] System integrity check: 100% OK. Initializing scan. [NET] Handshake with node 0x7d6119ff successful. [FETCH] Reconstructing ABI from function selectors… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Tracking pointer 0x7894dd87 in memory heap. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] No critical memory leaks during simulation. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x1bae4168fe4bff6639778ab0a6fbd8a5ab59ef50 0xaeb637f63f7de3e44c9bda49a40ab7d4768a3d3a 0x1ddd1dc3874ec554ae79ad8fa9eb2f3c5dac22c9 0x8e89f393c4b3ae6cf2ef016ca417fb7248397d67 0xa609af74a8bcf3c9698ca20eb94ea425d50f6e19 0x761fea2bd2eacbfaf834548d5065eb8eb4cd5264 0x7abd0a33dda684accdf886668799a293b1222785 0x7cc0c492b677eb098800877c626e150bb1040c27 0x30032342ea4a0df4a68bfac34a84fb8cdad1f3f4 0xb20e1293e808ef3122db699979c7cd0f7bd422f1 0x468811e47ab2f28c92b5652430c914d63ffbe7ac 0xe63b372958e52a7baf1aa341bdf6413955baf509 0xfa3c75f3f849e9475bb026f70b51be27c90467e2 0x548a2ee3f350664ceed3c07bf9c7b465b6a7e1c7 0x93c6539e54181ba3ccf292dfca520ef8edbf1d9d 0x0a0b0cf7ef619b0380e905979a741994318d8069 0x8e71d61b59392e4fddbfdb344754afc3b8b761fd 0x738fab1ec99dcc29491e523324d009cec1945c86 0x5841261ac90e186e654a5639ca71426ee515788c 0x21bbcb0ef29e21893f330991461d67cc149b6cfa