ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-D2CBB2EC3FED
|
Infrastructure Scan
ADDRESS: 0x33cb74c17ad79426a9733a7e6ac04bab063d004c
DEPLOYED: 2026-04-28 10:36:35
LAST_TX: 2026-04-30 08:33:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Core initialized. Checking license for cluster-node-7. [NET] Pulling contract state from Alchemy RPC… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Tracking pointer 0xd740ab4d in memory heap. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Comparing result with Triada-Security-Standard. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x200ddffab804307e0af8ef9b8659f71353d752ba 0x2fc59a4be1c25733a37a5c975fe7981872b6c079 0x561a224d00f00cf8849701e75ee9c9d5e789e93e 0xbdd2929b0d9e54be865861ba4d6a46ab05255b25 0x0833138140c96f1a51608f9d5c6992c0294560af 0x457a13bd6b243db2fed4ad2fd02c83ffbabf2eda 0x788f0b81809be6f5e07f277a676c7f392c3854aa 0xcec3b470bb07dd4c505a1821caf69e39bf50414f 0x5344f0022841cbf81dddd5cec0bf64b8ffb39a12 0xad7ed12bbae4aa9b19f55a16d00496689eb3d074 0x4cf5af72048142c7ff18e648ded3bad42dc493b5 0x51331cd2874f5770d54a4287a2f4b326b8e1a9ec 0xd47fd0d540f919edf538d9260f63f7264aab7a15 0x0411a4881a0437d33f063771c3dae61011f934e7 0x29b316d82e14c7e1f761b89277b5c3713f156304 0xc8407d53182fef85abb4267ef8679aa1a36c0b18 0x79c99fa19b9cb36ce2ed6dca9038003e322bbe23 0xed48613c2fd0dcb416780a06ceec322f0d6b2615 0xcaf90198b0a95852033e49d2b935dd6c49feeda0 0xda7d80f88c30704a3f10356c298b80ba14e869e2