ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-F3C45CE0AEA1
|
Infrastructure Scan
ADDRESS: 0x620307db683ec2d4bba26b2697e62c4c85b977a8
DEPLOYED: 2026-05-13 09:30:35
LAST_TX: 2026-05-13 10:36:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Latency: 93ms. Protocol: JSON-RPC 2.0. [FETCH] Reconstructing ABI from function selectors… [SCAN] Mapping internal logic flow and branching. [MEM] Tracking pointer 0x3ceea444 in memory heap. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Program Counter (PC) synchronized at 7481. [VALID] Signature verification: 0xb4376564c55ad39f2da9d76cd8a57588621e4cc7306ad968f09b0d898e147a9f. [DONE] Log signature: 6cccc152b64b550018274f7fd5e28a94c0fd891d12ae401318755ad90cc29b12.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x7f09e33a20633635596589f3d8d86aff38253291 0x3d2445d21ffee56ebba89c31629dfcf7ab356bbf 0x069cbf1d2afdbc791d4735fb1b4ab7c21bb77b98 0x656c771a5ee64c59512e2cfa2da01720d790c7f8 0x3611d36a7c052211d6f3b1a39326ad38a02832b4 0xe89fed9a81cb8b19338f70367181a1a4db5d06ae 0x7b2d4142ee48b9ccd4c222cefb681ad4b71c3f2b 0x0ff38b60065408b9f08541e32346d4db90d656fb 0xa8de7bd0bf5de90fcfe646d5defa0382b24056ab 0xe27af1b5efac4ce780822414073e1a1b2a335c4d 0xd65be397341dfb921339efd46bad2cb58d2c79db 0xd90046ee43226196924741b8834499dfa5044e21 0xff9cefc4884100bdcfc45cbe8cee1b4bd02c265f 0xf0ee2f22f18e831ad65849beeaab721a7b921aa1 0xa0d75751d8165c2359ea870ec95e017f52d0982e 0xbc811f68876be26863667536b56827fcf9142939 0x8178aa29898f32f42ff22705f2105ce10b6963b4 0x5b1b73e4825643598e180847bf3ddafa6e716749 0x72ef55ca52445dff5d6df0c72e9d84f49190f933 0x388aaf1ce348c49e4c50b626c55a19a68e27f42e
