ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-4694419E86D9
|
Infrastructure Scan
ADDRESS: 0x460d7dfa7aefb52ddb7b87a767485325b31272d9
DEPLOYED: 2026-05-16 07:09:59
LAST_TX: 2026-05-16 18:13:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Latency: 14ms. Protocol: JSON-RPC 2.0. [FETCH] Warning: No source code verified on Etherscan. [SCAN] Running static analysis on JUMP instructions… [MEM] Tracking pointer 0x8c69a3e4 in memory heap. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] No critical memory leaks during simulation. [DONE] Log signature: fb2320b566d001fad9251cec2bb59ec0a829337e78820b9724db1f25ab869f3b.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xe23a710466287d77a0c5a5de6a329da00ecc16a2 0x35b5949f9026e84b45c0f968dc60e9945bfca8cf 0x9d6596a2324dbaefd02366ff696b57538afa0d57 0xd7ddd4c8c6ff824c688689386a0e3b2ab25cd764 0xbd6ff52977d40e473495215c9120ac4fc2941a35 0x46d6fe27da251d2210ce4a76dccaba7e092d35ef 0x20a18e6dcd7463cb52dfb29b0dcd732861fd1de4 0x163bac3a149c2270db79f47499d67c8b7d31bde7 0x165caa1e5fc074367614bd6c19b80c42819cd716 0x741583e1da8eed9ee401c12ddc60c9fd27d570b6 0xaf9e86b06b14a05dac8664b436b460f1cb1209fd 0xbbf5dc824f523292fe699018507ffa3e2a53488a 0x5f5d04bcf70e1aed0603607db33b38ef9d4553f7 0x005a5be07952d913a450d6ef7eb17a52ddeff73c 0x9a8005a90037aefd5bc6792777016608730eb108 0x90f567b0ae5bc7742b77290548e3327455d29b1a 0x4f9e7098b87cfdcfb375eeb62530377a0b73488e 0x9675334af7a04205f715ebd53fb7fbec69c515ba 0x84b650afc0799ff54d5216cc8b3686a2018b7310 0xc0edb59a6dc4bebe9351a6df7a3a34710568b72d

