ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-4EE5C30BA25D
|
Infrastructure Scan
ADDRESS: 0x4458d1894bc15754caf3cdad66bfdf41794b618a
DEPLOYED: 2026-05-14 19:27:35
LAST_TX: 2026-05-15 00:46:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Latency: 57ms. Protocol: JSON-RPC 2.0. [FETCH] Bytecode size: 3864 bytes. [SCAN] Validating EIP-standard compliance (ERC-20/721). [MEM] Snapshotting EVM state before execution… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Call sequence: 488c -> d12b -> 2c50. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(‘26695447…e7635095’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x0095483d348843749678e646ff34a9331568483c 0x7a9b3bc959b1e2f2fc44a609dd0ac9206ee591aa 0x8b6edce6178594c57c25ca13208e00cf243065fe 0xcfc3e49a7c7b38bdfd40c92b54239bf68caa4960 0x35bfa39b399456e80c7a45a6ffa4364852be056a 0x2b3499f13cdf78d9a497cad8087c434e5c4a523f 0x9e32be1b3fd9bf81fa20a1ebc891c5eef8de5d41 0x62298790de94f5bde9805fc32dd37620713c137f 0x699fc30c6c04ac809ea4bc25d85e0ebef06ebfd5 0x367b3883ab5721b196bbf5c2127ab32fd8679fa0 0xc8d843a836321331876e8dda5a9af8c4ae7e78d8 0xdc0df3f8f3ee3be7f111e27fc6139ec071795ea1 0x25a35d85de0e8e6bf03a709c5cb12794be80c76e 0xe1d12de09b00a66640e0f272cba619e9c26cdae7 0x172c139becff31f21265dd29040ae9f796d5812f 0xf793b6e434eeaf821d96b6cc7c79fc83c3825b2f 0x1851c64bbfad132cbe75481f1690c381288ea492 0x75d4ef7cd83fc9b684d97a1040e8794aec701a4b 0xbbcdf6f6386e168db69e08e9e5f552ab92e3e257 0x523e8103098c4a5a06d979b4001123f0143e458e