ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-2FF0448E033B
|
Infrastructure Scan
ADDRESS: 0x7790a0d62b3486eaf8a9f3cd54f917b8dc98e272
DEPLOYED: 2026-04-24 01:39:59
LAST_TX: 2026-04-29 16:13:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT
EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately!
|
> Execution_Trace_Log
[SYSTEM] System integrity check: 100% OK. Initializing scan. [NET] Connection established. Peer count: 36. [FETCH] Entry point found at offset 0xe9cb. [SCAN] Identifying function signatures (0x23e5f5e4). [MEM] Tracking pointer 0xad062aea in memory heap. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Debug: 1383c95481cfc6c7. [VALID] Comparing result with Triada-Security-Standard. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x071676328c2b0edf0bb0aed53a7f0d4083aa76e7 0x21732fda63218356bf5fd1f078fe8f5ec308f284 0x674f93beb60be98a5918e02a94f72b8ff55acdd6 0x94d5b0182ee4a8bcb188b4b398ce03ba2c1f1c90 0xd08332cb1390043fd766eac8d63054fae0ccea95 0x64c4490324757ef27c3e2a8fbed2630be53ccf48 0x658e0af2681eb7e3f0bc7239ffc8883a6b08e229 0x5e74b30f13843ae8c20f7ccd605439ea956b8f21 0x8ad0c4ea6985b2ca9ea80433893e8b1d8dc4fa65 0x3e5b43ef1fcd5d2652afd8f7e56c4d33033fe68b 0xdea02e638eed30bad417298dcf7354973dd1225b 0x7450f03af60f835adc34d1ad8605c145d21be1dc 0xbaad936c0aaee80de23f92b3746c377af918824e 0x9d35142810bae3c529cc45b31969a5ed6bfc4f5d 0x50722811c7ab913df388390150d8c24446c88d2a 0x2d57573be7a772e5f6fdaf5e16500e55e09ce684 0x2d11be1e938f7e8b4f0c2bb1f55d2598e230a60a 0xe1fa55213700f3cc5544769856d07a90862c9127 0xd239e83d4214f2663f6bd94a261ca0b9f4d03c2f 0x0210320f1817f076c65cd9b075107ab4d58d8963