ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-DF0F684629BE
|
Infrastructure Scan
ADDRESS: 0x4e19d004700681cdcc31321576d3ca7214a4350d
DEPLOYED: 2026-05-06 23:48:59
LAST_TX: 2026-05-07 00:33:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Handshake with node 0x427e0ab1 successful. [FETCH] Received 91 segments of contract data. [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Allocating stack frame for EVM simulation… [VULN] Investigating ‚Unchecked low-level calls’… [SIM] Executing dry-run for ‚transferFrom‘ method… [TRACE] Execution path: 32% coverage. [VALID] Security status: DEEP_CORE scan finished. $line = str_replace(‚0d5f3a7f2f8795175ff8ab1e9b6ea9a607e0b1ac24009820784e817fb483bcef‘, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xd2eacc07a2a1892edb55c3b52d2df2af69bee850 0xdadb48bf051f4e3450284d174c98ed6a38cf1dd7 0x6474cf0ad5ee3efdaa48e779bee7335df48c1daf 0x83b5664706c52aa6fa003a316ee8ca0d23d88ef0 0x0a72e6d3026d5f3d58f0f9c0386c02a2cbefbfbc 0x300d349491c6b306c75c606a04a3a1193121450c 0x5f940b80dec5d035c9b745c25af8cbe4a64bc18d 0x7640f9bc0d5e9999beb7e176dbf8378c10574f53 0x581a61e6a4ec300aad91b8068a2c0dea6517f6c6 0xf41c3d9554956d8fa562f408c3ee17e54b0ad808 0x5afe50d1aa10da8d1e8a4104af563b9497ded85e 0x6b9e8728c8bf4b0fc911d1baced795c6c07c090f 0x44daaba8549bbebc330d868b1e59fa7fd531fc20 0x7d5b0afb6a48fef28e70cb6df76710543260c48f 0x6486a07ba0f7b1f60b18096aa2a6665b77f7052c 0xa6a92e8696f6848ef200ba166eb54f0cbf95da11 0x4e30417d6863f5efa9d8b1660586dbaba450dd9c 0xe1222da0012c2697de5deb8e0eff646cc65c60aa 0x99c546caec181431b835c9d992b128ef86812630 0xf6ee6766e65f5cc809b5e22d7e803683fc7af72d