ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-240FB1104191
|
Infrastructure Scan
ADDRESS: 0x630410ab4b3cc64a986e224a59d1339b9c25bb1d
DEPLOYED: 2026-05-08 07:34:35
LAST_TX: 2026-05-08 13:40:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Mapping peer nodes for transaction trace… [FETCH] Bytecode size: 3690 bytes. [SCAN] Identifying function signatures (0xf8cdce7c). [MEM] Snapshotting EVM state before execution… [VULN] Warning: IS_DEBUG_MODE found in storage slot 81. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Execution path: 11% coverage. [VALID] Gas optimization score: 26/100. $line = str_replace(‘C3A15DF6’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xcf3eb427b4eaa23261ba31b08600c2cf2327dbac 0x8bf3eda3a4481f329c1fa6216a4562dc8609a4dd 0x43b03e250f0b29e9f62664db45b65af691470bd3 0x2614ceb0cd85f5372e674056be60f48c6d5ae2da 0x5fca67297772ca628606f621845d2366f69d2779 0xbe7edb3e500cd5df4685337e46d561e143f4c93e 0x6a20eb39bf507512da71d071155a52d3475177ff 0x915c6f96fb1c6e13c65e345d7deec215ff9c8848 0xfbbfdfa9f311e751e976b6243381ddc4016c4253 0xbe2fed4741d3c08429f0a1416491eea8a73e7080 0xa45f95d7a05dc96960b6104254b309356c31a323 0x49028c5db3ac0a0d1a869ba16b8e22027f16377d 0xce2b83708ccb0c85bba0f14b93a468c8c29f260d 0xec4103cea51453697c3caf3c6ac9b818fe7b8ff3 0x9f8601734dba45fa050b07c431dec42aeab67849 0x520b10b1927e71c68ec3c22864a54c4911262374 0x7c87406f4ed9f571d2bb0c9aa94ec36aefd35741 0x787471b46d7ecf160e18e5a0f9ab41ef95a11797 0xc19f7655fd08e3b6e85756cd5456fc02c3a7e96e 0x053d354bdfc3623497c9ad9741bf24b011f7ce99








