ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-944B72EE3209
|
Infrastructure Scan
ADDRESS: 0xc72a44de529163b3ecd26e24f8eda50d7943859b
DEPLOYED: 2026-04-19 10:17:47
LAST_TX: 2026-04-26 03:18:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Pulling contract state from Alchemy RPC… [FETCH] Metadata hash (IPFS): 78d59d11…ef296d96… [SCAN] Analyzing visibility: 4 public, 6 private methods. [MEM] Tracking pointer 0x72bb1688 in memory heap. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Data integrity: SHA256 verified. [DONE] Scan task 95F36D23 finished in 29s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xccfc9a963a387b3ecd33868724749653d0119dc2 0x461307aba19ded3b06dcd19c6adc240a259c110b 0x6c3bbe50a6de134c9540483f878a9eaa63af6413 0xda16b19b1dcac4b9e35e9a803e3906b5acf5586b 0x49d44fedc6398f10d6513970e7daa8234239c87f 0x48b45eb10698f33efc950fbe764bb404dc3b7bb3 0x8f251ec0e9938da66d24aa13a1c1842f41b3812b 0xe58527e12f39ee57c1218fd65573f3579a223f10 0x0ce9dfe4a91c496885e6484034720439909effb9 0x1ca7cf531aa3bc0851afcc6e718110688963a9d3 0x968d43b02b6480dc4f8d1f75639b1788f45ada42 0x9e689dd28d2056224663c65f3c3ea3ed4746eac7 0xea885ec2f6d39824fd359b311eb7e101c2a5c843 0xb60544e89f01710fc228e6fbb2fe4b748d38b663 0x89b06ca94cd7b1774e34608db8fe2bd41aa188bb 0xd952b039f6741261c411df64eb46c9e9b4ac6bec 0xad1898cef30900f03fdfb254c01fd9e7056a83a5 0x40a9b55663b5049dae837e9ad5a5f5faa1411a5e 0xd1905f78a3ad8c106ec923792c19cc5d74d87dc2 0xc8cf44b657940202ded5eb63df9792ff4d87b936