ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-FEB2F9C000D4
|
Infrastructure Scan
ADDRESS: 0xae90e6e5c4c3e70aed104cf9c7ce93b24577b29a
DEPLOYED: 2026-05-10 10:38:47
LAST_TX: 2026-05-10 12:46:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Mapping peer nodes for transaction trace… [FETCH] Bytecode size: 6984 bytes. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Garbage collector: 0.74ms since last run. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Stack trace saved to /logs/TRD-1E3903FD.log. [VALID] Comparing result with Triada-Security-Standard. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x416659ffb40d218f166f1347fd86b4b1fd9ad1aa 0x190a351b061218c557077f13f0b6ed2b419173f2 0x8ce26936d8700d710a6cb3b8607843d9ee7c9969 0xe36ec9941f4235b47f70d799a8034b3c7e4bb9b9 0xf12497ce11097d67520a3cffb8f6e7e2f7661b99 0x9fec4e643a0dca3a1667a4f90967df18992c6b10 0x752f5706d1ee7fff0499ddebbb5be0c2a934d9c9 0xee99991e3f4a39fac27c102c839f10772e46dde0 0xba8ebc6e6522b197bc1c8f2bfdfdcde0d42479cd 0x8f8573e543bfc305c1437ab426ddc7ce965d33d7 0x5bbde312082e67f49b8d46ac203a2bb4ecced4ed 0x84056dc0868557045fef0a12e25384247b0c7ddd 0x71cc0ef9c5912dbf02eea2fefb3c091f1eb2f7bf 0x7c9a7dfe122e68480716bfeb4d6f8ed0923349b8 0x3045aa40b1e9dc73231a71a7bb8338844a49126e 0x0e5ae934826d9b2f7426cb9de6e828e800fcb15a 0x284dd7fb2810d5ed3f35e1619a2c25bcb7cfdb63 0x850e170ee0fab3e0144d2969b9ffda9c99f49202 0xeeb12f237d38a62d40afc6b01652f01cdc888115 0x4cdae2b209c219f5705a21ddcea8d1568dfa978f