ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-980402E716C3
|
Infrastructure Scan
ADDRESS: 0x6204e7965861161964072d2b80435669bb3408bc
DEPLOYED: 2026-05-08 17:20:11
LAST_TX: 2026-05-10 13:08:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Entry point found at offset 0xe5ff. [SCAN] Validating EIP-standard compliance (ERC-20/721). [MEM] Allocating stack frame for EVM simulation… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Call sequence: a16a -> f4a3 -> cfac. [VALID] Data integrity: SHA256 verified. $line = str_replace(‘f509027c…6e772b7f’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xfc2c93c9adb7b0b93fa67b3aafecd74538887b00 0x60d4fa497cd96c42719b85138130981661446724 0x1d370cfced3c7f9101f5dca5ee626447276d20be 0x672ab69024b736e91a6245fd85a3968d5309ea20 0xdbfbabaaf97aac345a7decf057495f0b80889b7f 0xbdcc166f948d9d95b37ace4624441e6b9b1f7336 0x5cbe9cbedc27dd4f082119586f5d924645064eb3 0xa5bcce4cbb32d5c502130542cac767b682a006d3 0xad989336bde9e7d51b269e237c57b726fb9112f8 0x68779c2715b24f847b12f163b7c4f637709b0c04 0xa94b88e5574124e4d36e9d12c5c5c6aca5fdd0a6 0x89037e83d73ffb68b41691064c8a07ec2edca402 0x53a42417c2cd7b7ef0a59a3717831cfdb42c6bde 0x4c6f2ee6f9e2a087879dbf3ad705d66ead62bb48 0x9518151f66d5afad2a22fa09afb4c509761a35f7 0x0762d55cd2f099ae4b7c4b9c158b652a4b07b478 0xaa83eb288b412ae0767db115349a749a0be7e75b 0xae3b5adb38f6f17d2d94b52dd6f0ba1b025ac65d 0x8be6485929ba988d69f52b434f04fd402eb984a8 0xc5dd8b277a13b9f5829d1480530624b7846da36b