ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-CC71D963BDBC
|
Infrastructure Scan
ADDRESS: 0xc4d0505c3e5e7faa75b2afcfd9ffb0730edddc3f
DEPLOYED: 2026-04-23 22:21:11
LAST_TX: 2026-04-23 22:57:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: A05F8F0F. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Bytecode size: 1553 bytes. [SCAN] Identifying function signatures (0xbe7edac3). [MEM] Allocating stack frame for EVM simulation… [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Bytecode segment 0xad analysed. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Scan task A05F8F0F finished in 88s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xcb55d17238f6a6d69b37861cc0ea7dd37218b482 0xd0b845916dc72ed922c3e6701506b6c1162bca33 0x74ffcba46ec12c7ebc34ac9b877e37efabc860af 0x807339b9a8d04c83446e626d65b1977648960c3d 0xe2df3fb58213188ad94486468fcb10d2db58a999 0x93b4909f72d3726a503e3521435b44dfaf8ef740 0x4bc7bc95c5174ecd7b8aa217a4b293e71926be17 0xc3c96ad43703b65c7e05ae4b1c6e0cb355d554b5 0xd67703d070de7f97aa38728e46acd6b8bd8177eb 0x5643ad97de4022dc9325945018a4e9a89fe4d599 0xb0bf9d7a47b86b35651b0b1d21eaa974471d3b1c 0x2f5dd13b4673740b536b0fc93e7abd4e31d626fb 0x4b46b2fcb587cc708a54bb5bc2eddfa74a6878c0 0x80058b47d5021a1a7e386353119d901a25b8d8c0 0x3c87b8abb71ceb70966c7bc046181a2d731ed592 0xa0d6c8f8b0da1dadc177af7b1e98c8f77c3ccc6d 0x7189a40122994b0d93ff9a848af3df13da20db31 0x6e8f02f70939ad8fa1497c6b3be5007c9100384e 0xa562015d89077948be410c16f2874d1362a9f667 0x032a35dada672b394525881f789a3b4e7734c76c



Comments are closed