ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-20BFADA1D6C4
|
Infrastructure Scan
ADDRESS: 0xcd8adb6422f8ee09879f3e511f6e15c1addd3b09
DEPLOYED: 2026-05-01 00:51:11
LAST_TX: 2026-05-03 06:59:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: F51E1493. [NET] Requesting storage slots for offset 0x00… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Snapshotting EVM state before execution… [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Debug: 85bb339279676458. [VALID] Gas optimization score: 74/100. [DONE] Triada-Engine standby mode. Load: 3%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x2b6930033dadb84903e2f142679a2f56d8729a43 0xbc7b12fe83c56747017a40b626445168be966c79 0xbaa6bec9695f3070796d63bae5a6598e78b0fa77 0x3c6c57e6f2f1e50b92442bde3195addc389f5d39 0xdc7ecb78041662f91a139cc1e55fe4eb5283c43f 0xe1e738557ddd5367f78939c4d241fe1fd60bd4f5 0xcc6b8e2f96e863881b01a1413f1b1451fbe5d9be 0x84c0fa8339206a89ba4ef39c1e1506f938ed2a14 0xf3988c2631f2d55e15465d1af9ddee464f08cc17 0x87cadcc428ecf2759fcc406c0e2d4ace01b8a2c1 0xdbf5137db9f42c10e1054309c90f19f0969af118 0xbc34830d09831e24c18eec52c36744a461472b43 0x322aff4be208a20678d7ebd9913a48339823f269 0x972d712ec863f4e071eb570c9be64069206d2aff 0x589f1742569c9ac9e5cb4f0db21071d5cfed890c 0xfc44eed39d32a9980fbdea4e568db1b79bdfe8ac 0x79fe5a8ff3b7a0051741e36a110487258db4df41 0xc5b294652e14ad57151874d895321b3ffd31691f 0x5514ae41239eec0a7e066e9221d1cfa048d886be 0x415250fa864548f4245991aaa29dc74d2672aff3