ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-35240872CF77
|
Infrastructure Scan
ADDRESS: 0x99882ed2dbbd8ce9a88f5942ecb2a9170c414326
DEPLOYED: 2026-04-23 18:10:35
LAST_TX: 2026-04-29 20:18:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Pulling contract state from Alchemy RPC… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Running static analysis on JUMP instructions… [MEM] Clearing temporary registers for deep-trace… [VULN] Warning: IS_DEBUG_MODE found in storage slot 65. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Bytecode segment 0x64 analysed. [VALID] Consensus reached on node cluster: 5/10. [DONE] Report exported to IPFS: ef4e13f5…e6206fc9.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x5058a6b8a07ba7622a247547731e4fc6e3e94e76 0xf2b7c1e1ae2d8598a0a140100b7465900cc072af 0xf39039721bcfabb28f7b5569748bee401095d03e 0xac3a04ebd893a1564b53aa52838cf986b2039765 0xd478134b62be4140af9650df55cc42fc0afbf6b5 0x47726f0b5ba99b26f6cf49a184098361b895aad9 0xb415d2f6f33d4d6bb713062e97a918f077cec3e5 0x182d37383e3f9056a496ac1cd57422e93b7774fb 0xd7875dfb16e472cd961202ead539ace1e31d48f7 0x3852a197295f21e79b0ede23a8a5a05bf0f87fbb 0xf88075ae35f0bdfa0c78d42a08e02123f3761468 0xdd245a0b4b9e948039896358c82606b87b5def6c 0xe695af6c41a32f7ba001dd35b9b1cf747b9e5a4c 0xd307d32c9d3a51d0a176ea9342af4ab9b0ae43fc 0x70a8e87d161ce6d3533b3c9b9fd7fae6957b4e4b 0xe17fa612c1e52fb77073d745f3afba50aac5045e 0x0e7c4e69d14d578ee2e057c93993469b33f858ce 0x2f00c9eea76389ce284409000747f70d833373df 0xf176937b84bd2644350e56d4b3a46230b83cec6b 0x8f129570d6f928b28a31d31948454fc8be0d997d
