ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-1A588C685885
|
Infrastructure Scan
ADDRESS: 0xf8e9b6734c73a829e53b0bab060fd53c6ba08d87
DEPLOYED: 2026-05-16 23:26:35
LAST_TX: 2026-05-17 00:59:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Hex dump completed. Entropy: 5.27 bit/byte. [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Allocating stack frame for EVM simulation… [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Stack trace saved to /logs/TRD-9336E514.log. [VALID] Security status: DEEP_CORE scan finished. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xfd9337ce8038be32a4460427166ce93994521240 0x2e7e5d2d769eb75affe327dbde960e89b97fb513 0xb06a692e58bd94cc5e6d6b86e7df048f7b837a03 0x89b42a632eb33f5a5124ec2ee7a816ef47d168e7 0xcb46ba6952e3e87e49645c2b9deda0fbfcbf2fc4 0x3a9c1f8703fbea3e0895df5200ded305444d4b71 0xaadd6e7c3f012eddc8ced0625fc367cad47b7169 0xaa067e948604f2243cc725b5b82382498a380553 0xaf5ab98b9b71ba4c2c584eeacaae7621cd8f3f26 0x2e9c21aa4890cb934fd363c57c429c9f4bd3e689 0xe7c6c2a67c1ac32b5706418fb02d4d1906feabaf 0xff6eb53751627a3c032decdaf406249a3c08b7c4 0xfd85b81242c5d1e91bbd019e80f596b92896769b 0xbc9345405d90c3c922091fc5707103a883350a57 0x6be941fe0e3fa69437729049c7dfd65683548142 0x1b0977e7882760282733226543b54c015d3e08d6 0x1cfee1525ff087a37d5c0ab9fc6497d256d9d3e9 0x4f891719ef25d2ea4170b1b730d0ac2e726830a0 0x4832e17f9168ff327aa044c1fe180a5fef5c74cc 0xb7dc0bc5806d07411dc99f386884eef2e74f05d6