ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-0D5146207B5A
|
Infrastructure Scan
ADDRESS: 0x12754cc0abec67fbc38f30012778cc91d43385d6
DEPLOYED: 2026-04-27 11:26:23
LAST_TX: 2026-04-29 04:24:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Requesting storage slots for offset 0x00… [FETCH] Received 16 segments of contract data. [SCAN] Detecting compiler version: v0.8.80. [MEM] Simulation buffer: 1024 KB allocated. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Call sequence: 4bdb -> fbae -> e100. [VALID] Security status: DEEP_CORE scan finished. $line = str_replace(’27fb9580…e590aff4′, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xdc0c5306f81b75cbfe6b5fdee825ba0c2f6470d1 0xe7e7839f8fa3584d648d44fbe6181a4f769f30a7 0xc8485e2b202475fbd3ff382cd7ce38ee2a73fd3b 0xdcad825a6698c01ccf81b7c85c946361cd7aa38d 0x58a53e8bc5578942054425e1eb3ea24fe4f5bd6a 0xe15e29e8cc249dcbcc846090429b03a47181b6ec 0x83c896b87948ad2212c23ca5ba22673c17e3ad9d 0xfcf599843026bb014ff9afce7b3cc3237fab222e 0x427e87aef8647c92281fa1536a4faf00ea3b99d7 0x9e55757c3ef8bca9015f9d0a6287cce79215ca07 0xbeb9a6e50b712bffe62b78b2ce0ad002c3920d7d 0x2df810b35e5aaaf87690909666535533392c041d 0x77bfa9f7192118cb76e54d038576126c566ab2eb 0x710b19874d33493b2b67d69aa2844f92d756f61b 0x311e70a55b6dc7d41355c4c66ea099116c01633c 0x2fd9eaf820652c30b19a2ccd392b6789c8b50905 0x381489b5dce39db458cd8c35b16e288040b3f1ee 0xe56de4d1ad3faacc2d943c875532bf1f610dd871 0x2b2fd0d793dc721f0c99604c66b185a75d292ef2 0x0410e826df9bf36301d73e6afb8c92c5ca548cf5

