ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-8F994758D5D2
|
Infrastructure Scan
ADDRESS: 0xdba1193eed47b878333293e8cdf72ec87fdccae8
DEPLOYED: 2026-04-21 08:14:11
LAST_TX: 2026-04-24 14:01:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Mapping peer nodes for transaction trace… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Analyzing visibility: 7 public, 1 private methods. [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Execution path: 27% coverage. [VALID] No critical memory leaks during simulation. $line = str_replace(‘0xff862c3512d20bdaabc47f539ec39671fdfa31b0’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xba8cec75b8df6f7296d2a5b4371168f28ee25bf6 0xc13e58a5ccd54f270fe69f74aad8879fa1938c52 0x118959835cf8e5b32459c1b33fdf1cf5f899772f 0x76d8f720df821687a10994f9f60bc17fa75413a4 0xd4f68938566804d583961c2f4bce726c43608c74 0xaeeea5cd4e71afa87f4a84374751298d5a4d3f4a 0xe481e067d5b9eb09988e87e34fb2c68cad5072e7 0xa540de149e5c91939818af3b7114bed349c4e56e 0xff9456ce0e6bbb317b0ac9c85e137d01d9c4e77f 0xcf826b0f582244456965bed89f7a7708f81633a4 0x778439d00c50c1035b252ea5eb7e116b90efe9b7 0xe12665db44714eeead8c3ff119665a95c3b9b5e7 0x7596a09867425ea2138bf3227104dc6c2851f7cd 0xe4015dabc74725544b398f9637e020c586f9081b 0x45362763166cfed6174d312fa1449ea1fc37988a 0x7fe423f5b0203d4f2d8b08a3705b48c129ba2e2d 0x962392a5f5d592548481b96f72686959040c6e31 0x711f50c9d21ad185bd76d91d60ed609e497e1b03 0x169f8aab4e24b078cdfb3177152c240db0cd6e62 0x807339b9a8d04c83446e626d65b1977648960c3d
