ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-1D12DD0C0E0B
|
Infrastructure Scan
ADDRESS: 0x32c842f29aabb58a7f8306aceb15d45a33c9c2c5
DEPLOYED: 2026-05-01 12:49:47
LAST_TX: 2026-05-01 13:49:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Handshake with node 0x1871fd73 successful. [FETCH] Bytecode size: 8880 bytes. [SCAN] Analyzing visibility: 3 public, 5 private methods. [MEM] Virtual memory mapped: 0x0000 -> 0xfbc1. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Call sequence: 1873 -> bae0 -> 7a1b. [VALID] Cross-checking with blacklist database… CLEAN. $line = str_replace(‘5aa38860…014a8b77’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xc1769568b45467891eccbf106722cfde3bf85058 0xb894876891abc16fead2079e94a3f927746a54a4 0xf1f7f1005109462262fac34c82df616b14ed19d8 0x3df084ff6b2ac31e85e143e4cc86d29449012930 0xf49d4af5619e462f8a1fd68c176a7a8ead638730 0x29d41770d9f34b779a5d865ba850af4347928480 0xda477d1e431985372121f88406dba3e899d05033 0xa5341fb00ad5c7f5fcd959758f854e009881b811 0x54a1f42f73f3cbe2026d0d2972acf4ef4a06ff7c 0xcff4d28e6c761ee486ae20fd2622c40e8b6024af 0x4a3cf26fda76b4cb8856ab0e2e035e95d307f9fc 0xd26b9821e9e1651e37798c0d69231c347e85b457 0x49bf92fc646f4595e8958505c3b5b5994aa36ec3 0x61c54e02fa56797a8d0f787dc93d87eb91aff685 0x97504dd9540ab94177d926c45d726855df38e56b 0x29256329d94800108486609d78157729453df18b 0x9780ea96741934cfd73cae106e3d50a6f52a5faa 0xc67627bb554864dee8b5ebb6985094a09b6856b7 0xd0f2e811bb7ea4310d2b574e88e062f4860d3bcb 0x3bf627e0782c85ebb5f6fdec6f3d656f39e04b12




