ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-A34EC199FDE7
|
Infrastructure Scan
ADDRESS: 0x6023f95a5a307d8264011915246ed6828fdd7398
DEPLOYED: 2026-04-27 10:17:59
LAST_TX: 2026-04-30 12:27:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connection established. Peer count: 64. [FETCH] Entry point found at offset 0x57e5. [SCAN] Identifying function signatures (0xa035f50a). [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Call sequence: 3248 -> 56c2 -> 58c1. [VALID] Gas optimization score: 61/100. [DONE] Scan task DE34FC2A finished in 49s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xd7ecf2e4c6e1d7d92ccda2f833215fa6cabec4d1 0x83a560e788c7fb867bbd69da535188cc5489e2dd 0xe1f8c05108678917edc4778c3cca949ccd73ecc3 0x4f155035a60a7f3e502319420df9df169fea98d6 0x1f5e377da522cf2eccb11d404fc55a999e2f6a27 0x441f0c50d2f3113bc63f21f57baac570742966df 0xba5a2e004720555df05f94b4705231bf2b264e95 0x74139fca7069cd24c3cf0a83d20e9f15f392a392 0xce68cab6edc53acd11dd5df4fec47eedf9c6bf6f 0xf8f0562632bb1858df0b34d61582291a55dadb6d 0x07756375feb92bb1fab99b08c7e3a4713f4885dc 0xb5e8188a425c9222da1ea983fac027ce072c2049 0x87e3672df8efb4b9a6d08c2505c11e8d4d8819b3 0x3a587963c828e6bcb05bf8402f9e2f8137d49e87 0x377c62773dd56a410af7fa3b8b5fd001643fac07 0x9e8c44f085ad5a4bbb25348f56d65ebf323d7d48 0x8df320c6a516938a582b5a0597435463b673e3eb 0xa9fd8644740c1952a108d5e67dcdfc55542a465c 0x217651df4cd8a1253375beb6abe589f4323665b7 0xb6ec4845f5670b97555897968e4994072c244d37