ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-1254DF50C2AE
|
Infrastructure Scan
ADDRESS: 0x6969d5e01bd55b26bf40c23827d4daa40efd6969
DEPLOYED: 2026-04-30 00:03:35
LAST_TX: 2026-04-30 13:02:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Requesting storage slots for offset 0x00… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Checking ‘immutable’ variables and constants… [MEM] Initializing storage slot tracker… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Bytecode segment 0x1d analysed. [VALID] Finalizing audit report for 0x6969d5e01bd55b26bf40c23827d4daa40efd6969. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x859b97cdd9346568e764ebd268d7802eccf3c59d 0xd69d332ef8b76ac880baf2b9156c7fda32d154c8 0x0075f3d6ab7c67ec725b521db6808603d3ab4497 0xa5bd7269e8adb37267325ddd8dd9a890e939215e 0xf6d8c1d7365af3f96b1d4f935720e897b77c2bd0 0x732641e0dfcab31f73a9a68303311cfde6bce4b3 0xf4183fd67de8a556b9c4a7e86f080ec70b5d68fe 0xcf064c537c29ff1ae7b11df5dc0aa89f658e3cbf 0x0b7b1c7e991fa4945a9ec23d7c5cdbb3f4572a94 0x6ac3f33ff6cb4cb22bc3cdd98948b2ee4c6c37be 0x2704eb503e5c6294a9a2b2388cac8dcf7704ee1c 0x9cf05c8a5ea33f0065fad237d3e231290a8cb9e1 0x6336a3f6873d64b74be6eaa6b6f9ae4ecb139f16 0x3f05817d189e42def51bcf5cc56926008eaaca60 0x488edd4fd018fcbb97b8225bc2c4d3d824c62674 0x0296cc8b160698cdd91fd241fee22e309c5b7346 0xa6e20956430dc3561681c8439b0e9e93974d8994 0xbd009f66e369930063b21be2ec67f2a7c1bda662 0x8af00ab2bcf8f1ec54a1f39b12990f375da1d434 0x7d5625d44ec1ade6147514d7b5a068f733a18d03
