ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-44DB6FD297F9
|
Infrastructure Scan
ADDRESS: 0xf0052c6659dcbf207249aee3055a986da6b1a957
DEPLOYED: 2026-05-15 07:22:35
LAST_TX: 2026-05-15 08:20:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 45872A11. [NET] Handshake with node 0x2a775a09 successful. [FETCH] Loading bytecode into isolated sandbox… [SCAN] Running static analysis on JUMP instructions… [MEM] Clearing temporary registers for deep-trace… [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xf09a6beefc876edd9b7c45788fd97717ad10f4f5 0x2f582b871b6d35ea04a60fe4c2ffc27174f60171 0xed091b9bec3aad501ea517782f7d56fafd551d86 0x3901c7970f32cb98636e2c4b264d69ba71980417 0xf4db8870dd80a67b6c5167f5a9fa0b162711f730 0x49913bdc330cb3bcd5011bbdd001dc16ad80a4fd 0xe63b372958e52a7baf1aa341bdf6413955baf509 0xd3c2eef68881b72ece1eb1664fa483275fe55938 0xae30f51f15dfe68a2d0b250070bfeb9ecf70302c 0x3bdaa638fed959a6731a1c3243befd8812ec63e4 0xb0196f24a24d33b8feadc6d66813ba2e8137d5eb 0x225b1fb9ce57a7ff69f160581e74da4ec3a5afcf 0xe624ad6d09ba91614d02a0ea43afe8588582f50f 0x7afc83372eae02fb975093fe1030935f1b6f94be 0xedeb4025b5434656827af71ff82a92f02da7fa90 0x561606cbe7145c7511fdc396b09464869d60b537 0xad324e88aebdcee820d3c0c905bdd8fab43289f4 0xab0cf6967dd186ff3b924213b553a6c28da0425b 0x2a8ddb00081d0d7afd28de055bcb2c81fea0ecaf 0x5a7a74138af1a247ced65a22395b730553019bd4