ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-B1126DC90681
|
Infrastructure Scan
ADDRESS: 0xdbbe4a3cd17e50d33712b7da4caf31a601a24637
DEPLOYED: 2026-04-24 13:04:35
LAST_TX: 2026-04-27 01:01:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Requesting storage slots for offset 0x00… [FETCH] Bytecode size: 5475 bytes. [SCAN] Detecting compiler version: v0.8.90. [MEM] Initializing storage slot tracker… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Finalizing audit report for 0xdbbe4a3cd17e50d33712b7da4caf31a601a24637. $line = str_replace(‘0xb4f66fb1cfe3942df8afeacfb447d08e76c7edc2’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x1499c7b5c5fc4fb9978da667e234d0d5a5f3a172 0xf40251aa27dbbab41db155346828442255b03e8d 0x975b9f8053ce236253b8bd274ae9ab69ddc27227 0x488e26d4d76f613283c7a7d90d0f429757d4a9da 0xb7573e53d03c5f9b15d4d890b1452df7f06eb14f 0x5ae7cc69ee00bab6cd698d5bd0b17259ac338b51 0xc420f778d85cab30eedd314af965dd68541e275b 0x84cdd136c00e4d5d36b7d2a6991fa4375e4e6eae 0x421a6d29a677e5de5a20d7a43d0c6bae7e0e6e16 0x1f873db6f1823ea399ebbd4d4531b1b0b3a2ee90 0xc5c955c2db82556bb7d08814c6d85592b0443a4d 0x2aeff096a32d914d1aeb5050aea535d1748c3317 0xe13314d914fff00f2d1ae0c3b7718d8861841735 0x8e5b5233cd882deea807fada85a65cf26fc0386c 0xf174ee149e56bcc11315f4e402b6a2c60090b79c 0x8053421c183177d48c9bcf555bab5a974bbb2807 0xd334e673751ec86f8a9aca27fce2d71fa017343e 0x9493dbbaafcd881a3d90b141a959ca637e316291 0xb3939d2de57802dd4486c56a7a473e06e5ef4c7e 0xb5e8188a425c9222da1ea983fac027ce072c2049
