ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-4E093C801EFB
|
Infrastructure Scan
ADDRESS: 0x460dfdcaf4b1345c9d78049ec7c2041a43d8d050
DEPLOYED: 2026-05-11 01:19:35
LAST_TX: 2026-05-11 03:41:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Mapping peer nodes for transaction trace… [FETCH] Metadata hash (IPFS): 1a141ab4…450ce231… [SCAN] Detecting compiler version: v0.8.71. [MEM] Initializing storage slot tracker… [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Security status: DEEP_CORE scan finished. [DONE] Scan task 0CCE66EC finished in 59s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xa9b138259a37cfa9747c5b4823a01e7ffd2fba6d 0x5408ebfe1eb1b43308a96aedbdfd0f38062a8957 0x534e71bd4ace3ff1984afc6d206b3f9c39ad40ec 0xd9a25872d3c046df94327cd46bcde9e6541d6bb1 0xf2a28c7f65c1fb98d14a0494acccf0e8e26a9454 0xd127f7572fb2784c5ea7d3bf95282bd432d9dabc 0x220fd94da4119cdc7cd78d2b1ba5c345d2993ca9 0x95f1595893427817726c845d575415f903985a45 0x440241785c15c4f75041f7ad2da671ccba62e8b1 0x7cd08a7eaece7b253aab150a9fedbe189cb8375b 0x7c7d79af07eba29c8ff01c9b8bd539009a2adadd 0x46eecb295f5fd6b3f07b3a16bcaeb3d924f8262b 0x77266f92f6b70a169fb78db90053e7d735e772a9 0x8ed187f5f6abfd93725b00fff9b61f252b9d046b 0x1887a01437ddbee7dc7cfda666eefad441d671bd 0x3aa875d174b6a0d1946a292e9cc9fe85242f7d49 0x7c87406f4ed9f571d2bb0c9aa94ec36aefd35741 0x651beb336af3441c037da8e442f95a439f695d5f 0x8301f8e45ece6974d0248eb6376173ac99aa94ce 0x45a2e945e188e0d67e309b3ce12532eeaee7e50f
