ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-5DAB04E000B8
|
Infrastructure Scan
ADDRESS: 0xa75468d1ebbc0080c550d72561416a4fd5735398
DEPLOYED: 2026-05-03 11:44:47
LAST_TX: 2026-05-03 11:58:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Requesting storage slots for offset 0x00… [FETCH] Received 18 segments of contract data. [SCAN] Mapping internal logic flow and branching. [MEM] Snapshotting EVM state before execution… [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Return data: 0x96051e1d… [VALID] Generating cryptographic proof of scan… [DONE] Triada-Engine standby mode. Load: 4%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x6aa6d3d3b8d5d014d6c0e6acc4ec894f2c5d8a27 0x7f7c20b38f465cbd4b9701b96f756f81ed979558 0x01e045e2fc3c24317d6d12c6bed6eaa2ab0c6d1a 0x01ae263ce9232ca649189ffae804bb879129aa80 0x9ccd58cdfed369a2f439430f8875306b2ae1ab6e 0x434bb230745b075de10050d3132f46851848f2d2 0xef9882c376dd6da58c47da0baeca03b74b39425c 0xb40a4b70742b7bc896e1b1ba47cbb250ac86e4e2 0xd8f0e0acc2ec3b858891db08eb9eb7056085ce94 0x26b4910790a71b9d577fd62ebdd3f63507590a65 0x3703cdc5407007674838200b7b9a58de47252470 0x37cdb658cbfa46bf1419f4bfbeaf806d8ec2653b 0x36fb4d81bbeadbfb6675d84bafa87064d8b9501a 0x6d719f6bfa466a44c55364f53b3b859daa47804f 0x3b430c0e4e140eaa2e9d7786bd170583f405c42d 0x36750d709ed44e86b270852e8def518b258df6be 0xa608906c3db5e58b24957af0cd45d68471322747 0x680fd17893a0d5f8a4ab706f1912b95f5e5b0d79 0x0f0bea3a2f6afcd4e7ec146e71c25167318d52f7 0xa28255fe009816642fa8f71cff411e434797f1c3