ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-631355597B67
|
Infrastructure Scan
ADDRESS: 0x26f609db4b517cedecfc9422cb85debd16da883e
DEPLOYED: 2026-05-08 19:39:11
LAST_TX: 2026-05-08 20:15:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Pulling contract state from Alchemy RPC… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Checking ‚immutable‘ variables and constants… [MEM] Virtual memory mapped: 0x0000 -> 0x3ee7. [VULN] Warning: IS_DEBUG_MODE found in storage slot 65. [SIM] Executing dry-run for ‚transferFrom‘ method… [TRACE] Return data: 0xf3399565… [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Scan task D5F7C459 finished in 99s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xc7d7b5d8b2e161eddf8b5bb89e1bfc7451b677a3 0x2d8f86d0ab0d8bfc4c3a0ab7d234a2dfdd6da8dd 0xcd4ef21ae2a39fd5b798615ae3478b6bf55f4c9c 0xbf99788cf283f8d0b5e1864f59a3464c1e5e069f 0xed5b074b8dd71b96e36affa393216ebba3bc6117 0x3d017c0dee48627f236b37b68152b7676c9cfe51 0x250e805d3cb8fd913a40c72471739c98ee875982 0xb8996a2571df7ac3fae1ea844820bd8010ff73a2 0x94a13bdaa0d75e07848c165120ebd93ff2540c48 0xe581ce265c24bb20f18c8528302dd8cc153aef74 0x02315e130e4cbe91a49d965ea363b6c829d287f8 0xc9553e8afe24dbb5ad1d67fb5b030f9abe8b592b 0x5c564d4c49ce98dba7c87724cd1d0a6033c5cbaa 0x0722bfd08f52b14c196a67a5559e211b43846213 0xedb19ee947161110f9792312f2b30268c87c1a79 0xf47cabdf47a7cf58ed161b76364db1d712493514 0xee56a79717eb5bfeab4f9afd9cdfc273056d81f8 0x70c003e09479dcf0a4f6b4dfaaa19611322e37c5 0x314172f3f0d9bd55b27247d883afd2a3ce6b7663 0xc70bf46fd836d76ea1da2c61ee754c02e58675cb