ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-648DF6CD71B4
|
Infrastructure Scan
ADDRESS: 0xef6844480d2bf687757b22cc3d756783eae82fdc
DEPLOYED: 2026-04-29 20:10:11
LAST_TX: 2026-04-29 20:33:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Pulling contract state from Alchemy RPC… [FETCH] Metadata hash (IPFS): bf9e41a7…e17cebac… [SCAN] Detecting compiler version: v0.8.55. [MEM] Simulation buffer: 1024 KB allocated. [VULN] Warning: IS_DEBUG_MODE found in storage slot 22. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Comparing result with Triada-Security-Standard. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x642d7c0c007cb1285671f5a6bfbc6fb27089fb72 0x0881bfff8a40cd3478645b79c20b7613664769ed 0x394e960320c73f1d8e2dedb56b21752d7f754f42 0xe5c08c938a0f9ac90a7f7e881b4fb21905ecd6d1 0xa9d6f47727fc459f60a610345d1a39b982789835 0xd676c55b401ca1de380b0b359014bb56404724cb 0x9640c8dd3b96fc35e08ddeba4d04637ba096c426 0x8b71401f99b1c71c1fce55a1c77256f456908374 0xa3f7831d00175099f272c5227df8bf7b96d0d707 0x9844feaa6e65853e29b65f165e25ea50e3784146 0xe963d849594957a766ae5f7788cadc50aa6b1fb1 0xf3cc11ae91437b54ea8e121910df08510132f514 0xf443e82aac79679063d284e35a289954c3c14cb7 0x6ded13c65624487d257592be4e58d685619cafcb 0xa3ec39592b84706fd8aa8df0e2b703ada8659125 0x7a2c645468f4990f36454f61a501bc2d0632ea5e 0xdf681ba159673f1981195c3cc2489e52745f32e2 0x3bb3f9d687986d76f82961456036df9ba3ff2f43 0x318251ba1d1cae02eecb009f80313fa6f6aef584 0x587fec629ef31569a50dc905271eb4a7abeabc2a
