ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-EA22864E527D
|
Infrastructure Scan
ADDRESS: 0x02da2921522905ec15792ff77ad110e04eefa4e6
DEPLOYED: 2026-05-15 14:59:23
LAST_TX: 2026-05-15 15:54:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Fetching raw bytecode for 0x02da2921522905ec15792ff77ad110e04eefa4e6… [FETCH] Reconstructing ABI from function selectors… [SCAN] Mapping internal logic flow and branching. [MEM] Snapshotting EVM state before execution… [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Security status: DEEP_CORE scan finished. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xf08c670bd8819fca0dcb3c95d82c164384fe4705 0x25647c2fcf91aac87a32d02c54c002b46bd59d19 0x6c6be583c45075a5a3da03f81c2874607ac111f8 0x359dc43d534ff1a1e8aef3968da2b734b003b165 0x94b882d85c981a2830f869bced1262360b33c6e2 0x1595cd3e6bfef14163baa9cc6a79b9c8da8b33ba 0x47c074c1fb0851542c3b727d355e8a3e88a276ca 0x6647c5936e30d8d9e0ede2508c3513eaef6758b7 0xd4a733dc67a97dda50be64e7af28c4d2ae8e10eb 0xbd47423a670d020cbaf425341dc0381b83478bb6 0x5904c2786f941b8d519f58fcad4f0e80297d41f1 0xbfbf862bbe2cb72da509c4167c60e422cfab3077 0xa47d8916509532675e38352adddf3767f399893d 0xe82b73174c1e5d8af8982a6cdb806a282187acc9 0xb9cb4bcb75741a5964c7844056abdebf7fd87717 0x347b5d24eb4c9cff29bf26c049973c0b595eb367 0x1f556057b1b99babe3ee78f68a8e64991c0e8e99 0x4334733e00dafdcdcff642617e2b6e727e105ed8 0x0c0f836dcb6a1daa5ea17a5c199b9653c72fef14 0xa045bc8926e497d79d62b638d3319d3cb8a1b11c
