ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-C49414B48087
|
Infrastructure Scan
ADDRESS: 0xaf1e52927d724fd34773bd53ada57f4c2b742069
DEPLOYED: 2026-05-07 07:41:47
LAST_TX: 2026-05-08 17:07:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connection established. Peer count: 60. [FETCH] Metadata hash (IPFS): c516a487…6499bf7f… [SCAN] Checking ‘immutable’ variables and constants… [MEM] Initializing storage slot tracker… [VULN] Warning: IS_DEBUG_MODE found in storage slot 98. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Bytecode segment 0x1d analysed. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xcb57e981f20604df4a83f4a9f0ec088341554d1d 0xc52f8bd4f85e9698149a0d22eaf1a0c9646dec74 0x1714e782eb2e646a484f3d2bf7ab400c7d0a0166 0x697a55d58df31f6612aafc0b46a744855ea4a1e2 0xd5ef4da380b424f4ab7445d78663d554a28e1f12 0x3a86e053a86eeb6179a880f1478399dd9369a3ba 0x255e66dc872611e8b2ed6ae3c621459ef356e8a9 0x420c7620be4ecb0929b2d6ca7160d82acee1df1f 0x2edbdf011768d8cd4ef537658b41440900c52000 0xb3b6f503cfe347d1763458553bce5be16a7a06b7 0xefa785a68af965926bf3c1b755cde2e65d9c542c 0x37d8959cc39189511846c665e2b30e8373318856 0x2775656d64033dd4d6adda53c5781c24d7c86164 0x0b33f896db3838a2010e2031ff6e9d1d290fa182 0xb0f1121872e4d6a67497e2818fc971645b8e77e0 0x19b153d07302d305b3fe5cd9bbe6927eac52090e 0x34861aab1cf2abc0a9615061332bd9426a7c7bb4 0xd1baa732bb699ff599b4b3611c17243128cc753a 0x0366547c6c2d537e0f770fae3bec5d2a5dd94fec 0x72fa5e534e52496a4dbc9f4902655f7166ce36a1
