ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-463B57B2C898
|
Infrastructure Scan
ADDRESS: 0x4021cfe6d63209947f78a3631f6f9eab18f043dc
DEPLOYED: 2026-04-27 19:17:35
LAST_TX: 2026-04-27 19:50:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Latency: 92ms. Protocol: JSON-RPC 2.0. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Detecting compiler version: v0.8.14. [MEM] Snapshotting EVM state before execution… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Execution path: 90% coverage. [VALID] Finalizing audit report for 0x4021cfe6d63209947f78a3631f6f9eab18f043dc. [DONE] Report exported to IPFS: 41ea2b49…28bd49fd.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xfc62143e9d1a05e1b5108a0d745451d8280b22f8 0x490218bf36f617b5e9a8df0a75c22a0710df495f 0x5f0aef33a03bf0028fc46dddd4a86ee3d29e2972 0x137db60726db3033288fb4560713fd4cdf2f1e32 0x9de7e20ae43432043d5020260c7eedf2e9d9be05 0x2568fdaa22c2be90a0d272b52484f3a612cb3291 0xe889a4f816fa3f50d2c54d435a1227f26391035f 0x2d6b6b01d7ac2ba9d53d1eeb4839b4a9a20cfb6b 0xaa33170348f06c15b68a655f302b667503fe4e1c 0x4f5deb376800060d51f4931e967ea353b4667e8f 0x5d5a65910333c8d0ced1f1a5921af30a2263fb9c 0x5ebb583548e674fb9dc41eb5b0de60a65329d6a5 0xfa8c4617aba8308e7cdee2fc42cbf0c4a83906fa 0xf95fa354cafe3e92bb1f2e6899bb103ce8ab8bd9 0x13fb51bcb3c5ae9e7115730bc1a58ec676ceeef2 0xf776b2a5980a01c0403ddfac4842f3d9b1963904 0x2181058474787eab37b8f87895f10c2478332d02 0x30b337098e427e61a50f2917da3653f62ab5bec3 0x1abd8bbf75bb70a736a331f9f9879ddb8fa98c6b 0xbbfbf0ce667774e83f6bb13c794fa8e1d291b1d1
