ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-1CA67294551E
|
Infrastructure Scan
ADDRESS: 0x76b855fe3f910ae205a1d0043877936b04ab2817
DEPLOYED: 2026-04-25 07:27:59
LAST_TX: 2026-05-01 02:14:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Running static analysis on JUMP instructions… [MEM] Tracking pointer 0x5a03dd2c in memory heap. [VULN] Warning: IS_DEBUG_MODE found in storage slot 17. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Gas optimization score: 81/100. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x516cd34e50d1c7d82c9e88c2868f1d18e361ea22 0x1fd268e7b82c6fd4054583883eb9356925a9b481 0x265b077c682c0d0f7d809dac7eb30a375f463f93 0xdcc546c914a135776660be9e8c3230696db98733 0xa78c8ff32988c3b20166cd28354674cd7c8fb265 0x70e6eb18a028b1130c201d54d333f9a1e61ed33d 0x96d3f92be47158f6406f32cbfa78c01a42a78048 0x6c8568306a2f2044b1bbd80b00d01fd5178f606e 0x61b92931599e2f380ca6039cad8468491ea92dfb 0xec1a7421499d1da22466f2c7c7a558232d1dbc67 0xe5f9db89cb22d8bff52c6efbbac05f7d69c7ca12 0x240970848da0a974db149962cf50aa7d1cc64c0a 0x1bcf27ee4ed5493acdb7bb9cbcb5108454046019 0x3bd117effa2c3d3c861ea832f783f48000cca7c7 0xafe6dfd98454523774597cd25b74c3db09df35b3 0xfef286f20ab89eea577440e52fa1c05d9d035221 0xee2a82eb36deabe77666720ea1ba5afaf71f64e6 0xda2a7addc9be7593d4a887ed339311bb1e2766fb 0xa8ed0087e80dba70084c73785493d67738c3df5c 0x29619005afe79c12e54190506fa4a3becbbc12a5
