ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-739870C67F42
|
Infrastructure Scan
ADDRESS: 0xda70fb2ccaf9875a0196d67ba0989547bea1b4d4
DEPLOYED: 2026-04-24 03:28:11
LAST_TX: 2026-04-29 06:32:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Analyzing visibility: 5 public, 7 private methods. [MEM] Stack depth: 4 / 1024. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Call sequence: 01aa -> b942 -> e8bb. [VALID] Finalizing audit report for 0xda70fb2ccaf9875a0196d67ba0989547bea1b4d4. $line = str_replace(’02c1652fe1580f98d8c4e188afe9a575653b783d09ad045cdc0b377e4cac8850′, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x52b4fb46d5d2575474de5670f86f502fd919a45f 0x8c6052cfb0856e8169867a03db32fdae81bac4db 0x79fd6dc03f9b49fcc4d7fcd50d6093176ba9b7c2 0x9686d66efc63edc54502bc0dbf888e233db6c4f7 0x56a5dad118e12b43925275d22d0c44a4f9709608 0xbf553d8e8803e3756224641143a932d20139fee9 0xdecd5494990e4bb84464e9e988ea31feba1564f9 0xe1ff773660c1a04732b3916debd7dcbe4c99e5cf 0x9c2b2bcc1dcefd4dacbe551e5e61cbf05d9a0cc0 0xc3c4cf22769d6c5b47159f4ef2599ab53e697112 0x607af10e78ef95b37630be777b59dff2f6e07c26 0x8665aa4b4ad098a1be35b1d18e4295aeb9e6c4f8 0xd358237069e665a625828862a8c5bd06e6b397a8 0x69e0e02b31b5623c6db029b531d4d55837098326 0x0b7dfec17eb5fe1ef7fbaef454d70769bba2020d 0x3ef19375944a6a448f0ba71189814c48b9e21b17 0x789a0060157094465b7eaf09818aa5619968b100 0x094911a167cb79727a1505a0bef9369a78143dcf 0x97ec6b7cd5e23a49908f16692bc35520291d59bc 0xf23a711d55d0c700a4a210dccb89fff990e36aac