ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-9D67C7698A21
|
Infrastructure Scan
ADDRESS: 0x10f0ec179df8584b284d90d2cbc7ed2e64527f51
DEPLOYED: 2026-05-03 14:15:59
LAST_TX: 2026-05-03 14:30:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Latency: 16ms. Protocol: JSON-RPC 2.0. [FETCH] Metadata hash (IPFS): f8463411…db46bc40… [SCAN] Detecting compiler version: v0.8.97. [MEM] Allocating stack frame for EVM simulation… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Return data: 0xc745cf22… [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(‘f8463411…db46bc40’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xe67f176f861f90e2153118f9c735c53546d161b4 0x62d9fe0d6d4b15c11f8c2bc9d48cb96a8b091c86 0x50816726a4903049a9a65a041af075a0eda59f74 0xeb3b5271c88f2a0d546ddc52309fbcc32b548dce 0x74bba092b4b38f2abe717f1f90f1786d32032811 0xa04956389247836bcb331bd6ef70f20284a1984b 0x981be8315a127b63178cd248a340aea5b101505e 0x381d3e8d3a2a98228ab0814d4b3c6d0a50416049 0x12f26fb2f0c31b92fcd082ba6a0e42b097fe7a7a 0x8521fa7fddcffda3cd049bd23d4c825ecf4c14db 0xc5d8b1f7eb61b04d60a1aa11e1336a02b41b532c 0xd95888a281f50adebfffd1d8d324b6949071341c 0x4431da6146a9c5c63e65e862227c5b80aa1af003 0xe53d63ec952d314cf99745760eb1a2886fe29c14 0x0ecb87880effa4f4b70f3d607db939c522d532e1 0x59e076b7f9d5ca9e53dfeaa501106e35fb92ced4 0xca941770eec9d204c2d59ea0768fdf4bdb499a41 0x66fe8e5da3638993b0537017619cde2856ec570d 0xb83d63ef8d37166b47f18eab8d26a08aec74f72b 0x9f883698be09f6a8c34d133b8003b430a85f8996
