ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-CA770ADC7103
|
Infrastructure Scan
ADDRESS: 0x6cbd6a5a0a72bb798481b06f8beb293d85210d81
DEPLOYED: 2026-05-10 08:24:59
LAST_TX: 2026-05-10 14:48:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Mapping peer nodes for transaction trace… [FETCH] Reconstructing ABI from function selectors… [SCAN] Analyzing visibility: 5 public, 9 private methods. [MEM] Allocating stack frame for EVM simulation… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Debug: ac147426ee63d270. [VALID] Security status: DEEP_CORE scan finished. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x8a4001e7b570e0282cd81b03adf9877baeadd269 0xb9f6630a95c7faeb59b904d546dd3e5d5e09a1f0 0x3cb038fa55b87fab72b10154e735b36a5e5efc99 0x8a659e6aa5cf156a70a35a7f04f1eb91ead9a0d0 0x29e3d74a6c55535891cbc7ad2f01f3853f2bde56 0xa902dadf6a4087c94db4146fc82cbba95632fe59 0x23391a1760c64628a3aa6536735596b946d3d28d 0x888650ebb265be5feeb666a3b401cc0caea9772b 0xa57139ef17e296c6179ddcbd92570e2d04353e53 0xd1f68c72a3ebc11ecac70efefc36d6d023f12418 0xe9b0b2cc0813c9cdffd7891a6690ac429ad35f04 0x4d85e006ccb2b97d0efa76a61c45fc538ef5aa70 0x48f2b268250d218b721b0fc68a1eb134a53a292d 0xc13828c8b35d78433de0cc1ea935cb4708f38ddc 0xeeb12f237d38a62d40afc6b01652f01cdc888115 0xcf6327ffd3ff94b0f35a6f378393cbb88ae99b2a 0x6a6b5267ed2fce3f2b2af6d9184b064cb8cc22c3 0xe4b1bfaabfacd76bf32cef5e3c12f35675d315c7 0x13b84cd58182e5e571c4dd020bc70194b27a783e 0x6da3cafb69c6cc26f345ad2fbdab15b25df99224
