ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-720A88769894
|
Infrastructure Scan
ADDRESS: 0x67a46868e8706d1fde3f56d5d62e923d633a57b7
DEPLOYED: 2026-04-30 21:31:59
LAST_TX: 2026-04-30 22:17:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 52CF4684. [NET] Fetching raw bytecode for 0x67a46868e8706d1fde3f56d5d62e923d633a57b7… [FETCH] Entry point found at offset 0x9d43. [SCAN] Identifying function signatures (0x49c1a4ee). [MEM] Snapshotting EVM state before execution… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Triada-Engine standby mode. Load: 1%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xadd3a7a0adf2df981b15ccdd63e7967371eacf1b 0xe7acea2b6595b005c0f679d11fe05acff770c25f 0xb9b914ee5c6979ec294b9ae4e2a30a6d7602cfe9 0x70cf93d1793a05e5ace02da306ed74b3075b1648 0xcbd1ff4c3e5dd035cd1b2f11b2573e80bfcd4836 0x9d26ba49ecedfbfc3d9b053b53625496bd3763bc 0x268fa1eaca6afa91250510bdd36f301586d5f3d4 0x63edac47db7bc42b74ec6dbafbbdacf0996e9279 0x299e60469049034a70e47e4e035d178d901496c3 0x4501d676d726a28da3e9ac39ec704c149c03bb4b 0x809d192432771799a37bc1b49e2d35ebeeed91b2 0x51f237e730ef8277bc8f468bd4430b7146eb3316 0xc693ef432e92fcbc903c9d54478ed7e3c03f76c3 0x13bd70361f5b99c8d618d7c57dfd9235c549bf62 0xef80bc06f03e6d2ccdcd03c529ccbfc6d3b54a9e 0xc37dc4e973d32e1a0e335cab9a1d6cdbd273e6b6 0xe99efd768f26b9afd6507e6b9696c4430cd0b497 0x36c1e2f9f6a44edc80cffaf493817cd7380f9a06 0x81b01d0f26a555692e1ebdc9f9fd2017f099586c 0xdc7122c6b80150c91834dbb6f4b0dbd90e5d7c21
