ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-11B66F3B6B60
|
Infrastructure Scan
ADDRESS: 0x83f3853708cf613f3de4dfbdc5efe2bdc1a134a2
DEPLOYED: 2026-05-01 18:18:23
LAST_TX: 2026-05-07 19:55:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Synchronizing with block height 70653. [FETCH] Metadata hash (IPFS): 6242db8a…ffc3f5a6… [SCAN] Running static analysis on JUMP instructions… [MEM] Tracking pointer 0x12a7af5f in memory heap. [VULN] Warning: IS_DEBUG_MODE found in storage slot 78. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Execution path: 34% coverage. [VALID] Finalizing audit report for 0x83f3853708cf613f3de4dfbdc5efe2bdc1a134a2. [DONE] Scan task 1B0B0B09 finished in 86s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x8c792622dfd14db3e5160a60a91bea0cbfce6bc8 0xc7b1855728fb7373652f67683d94960a8098321d 0x1c0286d41b934aa74acb89d00bae05c5af33a158 0x909384e389d180c0280a1a998e2866c4e838eeeb 0xb4d738cca50b6788d3617bf1b849c209158bca8e 0x93e4dd4922f87d490eea43acbc2c7c672df55344 0x7b312397338358840c4ee158818657bc1c87df3b 0x4cfc1f65846f1f589ea28a8cb24916e53920b12b 0x7e84fa0ead657d581d44d09cd774a2fa638310b5 0x73d03b9ba674dabe7e679ef489d4cc8489a38bdc 0xb1ae943eb4c2bc6847a740365c74e6fa3982fb43 0x2d66e68dcadbc56b9218dc41578bedb69ec12fc3 0xdd109d72c9fa6cd0a493aea83b0daf36c523b9c2 0xf301e689a4766650fe4672d2769b86087ae7e13a 0x9133227858a7961e9cdfcfe1749a47fa04d11253 0x89a6bfb86e71d74c473f20ddfb6d8815e9361904 0x86ac3b72c33da04fd89f3641f89f88c5dfb95df4 0x6d35439c2dfcd3a3f89bb21adbbf160b0d176ba6 0xdf779a8b79404dbe09b6c11c84f0e00548792b79 0x2222b9b71be0cda50b045832d50b7a451a5271a0