ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-1C194D36C16B
|
Infrastructure Scan
ADDRESS: 0xbf7fe109f674ab1341d69e67a262e50ce87eb7c1
DEPLOYED: 2026-04-30 02:01:23
LAST_TX: 2026-04-30 22:18:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Mapping peer nodes for transaction trace… [FETCH] Metadata hash (IPFS): a7d844f0…2e243fe7… [SCAN] Identifying function signatures (0x8bf871d5). [MEM] Allocating stack frame for EVM simulation… [VULN] Warning: IS_DEBUG_MODE found in storage slot 54. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Call sequence: 3900 -> 1869 -> a1d6. [VALID] Generating cryptographic proof of scan… [DONE] Triada-Engine standby mode. Load: 7%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xe9a9dda6178e39fb03b115fc9c68dea5208f6b0d 0x0feb7385032f4646f31035880800684b2a360a8f 0xdc5f56418a7729202202ee10706b2f1733ea2424 0x036e1b7c8225c4b63b59ce2159fe799fc6d9b11f 0x7a0c5e998488a6845bd375a81154a5ac81efaaf3 0x8ca5bf7ccf49be724202b3195cded2ec529f7463 0xe1b25c32d1f888cdbabb71cde3c465b479e5556f 0x61672f7d8ba7c0e0ee902df543da55ba5018bf50 0x09a8c1dae4090052551d0c892964c77935453d53 0x7100239a61371e66962901af982153b1756d2366 0x244c0e44645ce20dc1a9781fd28dfe51c2c253ab 0xe9572347075ffa55501c89c7166895567bc38baf 0x4234c29b99c4b3c0cba083a01abe2350d7c5ba3f 0x5bde3fbb5b210ad2d846709cd68ac125ff616b01 0x8b0f047127d58692c869033a551872c4fe55e758 0x74fdd2e08619ef3c007298d711a080d969c2100f 0x45f22a63616618a472a901a070fe81769b255756 0x640c0ca452ae35b49966a4e66fe381adb8b56136 0x4e777f5a30ea1766ebb400e855855557ecb21459 0xf3b524d8b505741caad62d47fd5559a92cb16be1