ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-97E01CAE8DF9
|
Infrastructure Scan
ADDRESS: 0x8e73f24284d15f6d901f65f6bb8754cca43a052b
DEPLOYED: 2026-04-29 10:16:35
LAST_TX: 2026-04-29 11:00:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Core initialized. Checking license for cluster-node-9. [NET] Latency: 62ms. Protocol: JSON-RPC 2.0. [FETCH] Loading bytecode into isolated sandbox… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Stack depth: 3 / 1024. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Stack trace saved to /logs/TRD-77F19EFB.log. [VALID] Data integrity: SHA256 verified. [DONE] Triada-Engine standby mode. Load: 7%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xdc8bbdebc3eaddbafe06f5162ec561935911aaec 0x70af18dbd08b3fdbef9abb3695568ebd8ed3322a 0x5ee67c9dbef0c49f78f0f60d4409ef63762f388d 0x6949f6e188630ed92c49412d4dbd8637d1433fa3 0xe075f0978f5d1cb72133c285a38ed9c3ca97e58b 0xfdcd086a3eeffe334579be6da64a55b20ed30b53 0xe87863a13cb88e422c6930f468bd5b4e39dab460 0x1bbe33eb4e54a4de0ac03c34ddeeb62c8548366d 0xb33f1e736e8f7d8399f20216a9b8471411f0263d 0xd031618694a9d8431ceb326a6c4b865489d63def 0xb8e4f5fb04789f2c0fa49e90798e847ace87f063 0x1c3c41e6450f8a152c5c76b1f9e3bdd22afa9496 0x3b724db6a00508b300d6a3d91d6e6702e44f72ee 0xf009c30539cd0f4054c6a6c8bc2d69ce8be5665e 0x13bd70361f5b99c8d618d7c57dfd9235c549bf62 0x7b1ba55831826196f915f9ea07c2104e9ac3a17f 0x671cf64e5c94b8468e6d5dac53aae5b048134f97 0x4600583c994390d1473fe0320678dc9d3fe17ba5 0xa61937350a6bae83fbcd99f4382ec0771ef3cdc5 0x723dfad5ba9a85b82b12c97f03e77473e7f83747
