ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-6A7F09E31729
|
Infrastructure Scan
ADDRESS: 0x68b9a2759724f174ed6142e90a78d6f1fb8623b3
DEPLOYED: 2026-05-01 15:27:11
LAST_TX: 2026-05-01 15:48:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Pulling contract state from Alchemy RPC… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Mapping ownership-protected functions… [MEM] Allocating stack frame for EVM simulation… [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] No critical memory leaks during simulation. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x3767ab6c3b6cc1ff6fe65cba560c86dbf56ce2ea 0xa9035ca05c49d282c1b09a52aef7af2bf4a548e7 0x1e832bb0d69dbb348ffe3b83591cd7b025725132 0xa5f2b250e48daf03d4824b3de7519fa1f65284ad 0xec7f8c25cf3c204d44a38ae5873b0dbadeea7cd4 0xa19dd5aca21b1c4ba736f50c1a5a9a1726e27d36 0x3148bebbdd59ebb01b4acb2f552ac7f0e4f2a3b7 0x87c2403dbac20ce5cc11ad3ae83be70ca256a470 0x5c46d3b5bca4dd798fbd8b2eec00795dc7aca15a 0x4c5fa27376367cc08bfe84cbb060ab49145244b0 0x5d47492357c2a41a370759b97762031ecb6ff023 0xd6cf419e5ec5816b903643bc3e8a88033e7d7003 0x200e5a6e74b5c0e8f9308d6072ee38fca74cc69d 0xfa604f35bef38db91afe520b046b50cd4bf38dad 0x130e5e2204d98305ba28f13868701eb150026bda 0xd33c52855f4b7bedcfb044aaf9afe56860873d4d 0x1a30451747aa07c109974a19844abc5ac9e1c63f 0x558c88e750083468e6ecec2251cc3fe3ef7d74bb 0xf5bceb926c1e9f1d658fcaa62b3d0d8270919a43 0x81c03f5c8747fbf775934ed327af640674fa01bc
