ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-24A0442C4B1C
|
Infrastructure Scan
ADDRESS: 0xfa75a5038381698d507518f01c121bc78af9e95b
DEPLOYED: 2026-05-08 16:51:47
LAST_TX: 2026-05-09 08:06:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
β OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Synchronizing with block height 66511. [FETCH] Bytecode size: 3471 bytes. [SCAN] Running static analysis on JUMP instructions… [MEM] Clearing temporary registers for deep-trace… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Comparing result with Triada-Security-Standard. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xdad10b18fe3fad4cadbbe2730e97453fc8273451 0x830594ac8bd7121f58c1e2d76efaba22eda736be 0xbbb4aec0f6f75418f967c6791befb7d8eaa4d9a1 0x777e50d55731e2c27e8cbe261b076d54cb723320 0x7e437a80a7e56edd176774104cb86dcef7587b4c 0x03c8f8492a3b9be56b0844c571a6d3dec042dce1 0xde20414b030dd32f53ee1e1a05d22b28d4be3a23 0x6e63d5c56c8103cd18beff74b923610f0bdb090f 0xf186f38b8baec7bd4b1634ed116b5a32beb4d77c 0x8652e13bb6a12d472a53a8ee422bdb7b78101931 0x567fc8d024cd8f38dff47bc2d78187200635f35d 0xaf6432a6e9e4ca5dee9e140cfbe248bbd71d9e69 0x300f8f7009160b9c19a9f27231fcfc2c52a2e819 0x74bca5649f0396fb09be3a8015732f2115776f85 0x916ad7e8c3a84b72cdf28d660bea9735f9d512e2 0x3a4f63d7e933c5e9c03878ece8bde6dd2dee8c83 0xedc3a435213ba5248dd7d3ed7fca999eac6c4768 0x14bf34fa519e2b356184a76d5add22cd4f7938dd 0x4fc445dc1a49911ead5671f1f972afbc7fefb462 0xe4b48de726547bf332f9779e3b637d762d5a818b