ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-8FF9E0FEC4CC
|
Infrastructure Scan
ADDRESS: 0xdc2543ac36e6a7ba948d44a185cacc1f539dc116
DEPLOYED: 2026-05-14 23:21:59
LAST_TX: 2026-05-16 03:54:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Requesting storage slots for offset 0x00… [FETCH] Reconstructing ABI from function selectors… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Clearing temporary registers for deep-trace… [VULN] Warning: IS_DEBUG_MODE found in storage slot 64. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Bytecode segment 0x5b analysed. [VALID] Finalizing audit report for 0xdc2543ac36e6a7ba948d44a185cacc1f539dc116. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x23de5fa231247f3ca1954e20c302569eadf917ab 0x8d8ca2cb8aa497d81d4c24e0be301ec631ad727b 0xfdffdce68fb06282e473eea46e9895caedcd9463 0xc8ee94094d80efd2756c83c99468764467a505aa 0x06b1243cf8185706cb8b97c25925e96cffbbba9e 0x5664ed202c5dbdce29ba550b22f940c58febd635 0xdfc2d10cf764dfb0599de0b950bcd9157efe2ef9 0x45573a251fe35e0d8eb8e928ed85595d6bea3b3e 0xf35c73674c78dcea2f992c027dce3767c7e2ec96 0x59a1f0e7cbcee3da9650c2dd5a91b5abc8173a45 0x65c65c3394de70459dad680433ce7371265436f5 0x83923b66a6dd55130f4e445f2e1b2670f3a60a05 0x88b86fbc42c32e7b9558c88941a0796f92a8e6b8 0x5357a41779d8d811be2d089faf5de4e0ac562e31 0xbee71460963de2e20e6c77f7ae5fbb091ae2895b 0x9de894813a8f346715c370fe58e6856b7a77c34c 0xc0dd53395052d1b6a679e95d2548e00eb2bec998 0x3990a0f5e5682120bf2bc0a8ff860fa6d331dadf 0x3b0e37179fc806302f4a15f85577a06a6eb38b4f 0x30e4bd5976cb83cd65e9528779ab96d0d797da2d
