ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-5E020156382D
|
Infrastructure Scan
ADDRESS: 0x8f9def2bdefeb90978b1e42207e3a4829298607a
DEPLOYED: 2026-04-27 09:33:23
LAST_TX: 2026-05-02 10:37:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Fetching raw bytecode for 0x8f9def2bdefeb90978b1e42207e3a4829298607a… [FETCH] Bytecode size: 1454 bytes. [SCAN] Identifying function signatures (0x4df9c016). [MEM] Clearing temporary registers for deep-trace… [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Execution path: 69% coverage. [VALID] Finalizing audit report for 0x8f9def2bdefeb90978b1e42207e3a4829298607a. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x18d9ddd296b676d68e6658bcc6dcdb6c23c28457 0x7880287a177e060b7024c730833090a8670b2107 0x7e4d2046bc47b6b5a87bf441db87af344af92065 0xbf54c7786d58c2e0425c632f8a24a60af6df76bf 0x9497784da821f9de9c5f79db502ea33cbc2c2751 0x6da1c8de1e55895b4602a978315cc9a3469b4070 0x8acd71278e814f4a4b2491c054e71227754c21ca 0xc9f61d836d7274bb87069a5c15c1c1288a6e4253 0xd9ed0905bf139ec1f4b92aaf37a4b96db6175614 0xb70aabc1cb05a0e972b27d4d6dc5d13ebe2f4319 0xe9b993f03a99e50b082ab0a57b26a52c0f1cb6db 0x74cce6c1ed001fab652346819a6fa66ccf7ae115 0x72b5d07ad9bf0c7ab3d9514d28739fcc0035193e 0x31a39f5cd96b4a215043831c2e7ebf09ce04a154 0x66ac808c455b72c349fb429d197b7c89ae297862 0x46fa0da1522c83bcea38060618f3d2d18596be91 0x64ebce3b080351d1385f0bc92bd3740713c1852b 0x3f1612637f2cc5ba4a1ff864d4ad4d553eac2869 0xec30cbee2e60ad4e4524eaa8b1b244c9597e9582 0xb15ca83da1f3769f0c9fd97f7ad88362a2310553