ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-47D2429C435E
|
Infrastructure Scan
ADDRESS: 0x29af1dd51c7f8df1720121c3445073bda93460b5
DEPLOYED: 2026-04-24 06:22:23
LAST_TX: 2026-04-24 06:41:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: DEE5FB35. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Bytecode size: 1553 bytes. [SCAN] Identifying function signatures (0xfbd66eb9). [MEM] Allocating stack frame for EVM simulation… [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Bytecode segment 0xb0 analysed. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Scan task DEE5FB35 finished in 88s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xc9b635fbdcd503db0b5f20f8268c43c9f95e6538 0x154c2beeada1365ae07dcda4efbcdc8f9fdf799c 0x32804df9761d884ba08f74cf271c26ea1586bab7 0x285c86126bb4bbb1cd9d2939ac8e774fa532d00b 0x65267355d48bdb27f296f2659aa7f2e6d8dcc004 0x1d05e36edd5faef87d5694d6641a21ae1d41fd16 0x3c209fe812a5aaa1fab0369c78dedba038f0ecca 0x5fefe4f3bf4c97c3781b799885b3c694e947c4dc 0x929f1dee8118b94915c48746a8df8ec2c8b0ba81 0xf678c9aef42b4a1e07d0536200ae994b08d365dc 0x80058b47d5021a1a7e386353119d901a25b8d8c0 0xb7e6dd9a69016358282e5794b117589f846416e7 0x9a0b734c62cc551f9c778d426c1996ec6f7593aa 0xf0f5b702aef8542402b64163ccb85c4ee6cef4f3 0x1d4dc96e7dba1bc1b8831544d94ef1a1a6e085c6 0x00a00449a013445358d65790efb9aa75bff4c353 0xbbeeb067b48ceefc9e20617bc9281a173cf3871e 0xe926eb8f6ba997e5b45247ece800c0a27e539e57 0xfd0e9c05ad45cbb999246c9cdb81c29dfcbe8708 0x0049cc84c287e240d659512ec9b34134958c8727



Comments are closed