ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-969633A77823
|
Infrastructure Scan
ADDRESS: 0x26d7ad0e930b54b84c00daad077ee31ba9e2fb2e
DEPLOYED: 2026-05-14 13:12:59
LAST_TX: 2026-05-15 17:42:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: B0D8F602. [NET] Latency: 43ms. Protocol: JSON-RPC 2.0. [FETCH] Metadata hash (IPFS): 7d29cbfa…5c71d2e5… [SCAN] Checking ‘immutable’ variables and constants… [MEM] Virtual memory mapped: 0x0000 -> 0xa5bc. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Comparing result with Triada-Security-Standard. [DONE] Scan task B0D8F602 finished in 32s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x90b44a9d21a903274ea754c1f03bee3218f28b65 0x00abe079842313d0a666fa1f7b6c93c396d993df 0xdf84e1d83db0027ce1bd451925d6410d597e7e4d 0x091657be0f7fbbc00ae9e018c555b1f39d034169 0x4218597b598803d4ee3e620099972838c503e2f0 0x6b540b44dbefbf48191d695349a41c9c3346d0e2 0x45476c8df6e86f0c9ddfe2724b9de7a4e696ac07 0x6ce5c2477055b5b9df39294663f4528f6cc72c33 0xc1d68306bc156e46548acc9ec3df07a67e7f1638 0x0834fd4d0790c1ce696b30dbb1611058a5271ef8 0xbc5a51938fd6136806d4e939c47625474c73d3cc 0x4e37cb0537bd1586260ce08c1e037cc6103e84a8 0xfeef5c09ec99f9384afdb3c33a49abda0366c1d4 0xb9d0cbfef39bc82a79435689a74d08dcfe80c25d 0x0797a90886ede11f0d644fc3fa906ebcdf4cc6d9 0x1f8c8623d066a765a5625eab7622db6c6714f50f 0x7977502defd94fbd8ae5eb5733e2581f7ad6bda2 0x2834311b28d38b8bf23c97fa7ea1d7330ac5b56c 0x7f71afd1ae71e16fe53025058190bd5f8c40cc67 0x4b7b56044d6809dda85a076fdbf232bf9aff72e8
