ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-6BEB52BEDE15
|
Infrastructure Scan
ADDRESS: 0xdec4ab988e80e4cbcd245ab4702705815785ae63
DEPLOYED: 2026-04-22 19:07:11
LAST_TX: 2026-04-29 09:56:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Core initialized. Checking license for cluster-node-2. [NET] Pulling contract state from Alchemy RPC… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Running static analysis on JUMP instructions… [MEM] Virtual memory mapped: 0x0000 -> 0xf143. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Return data: 0xd2b7a810… [VALID] Comparing result with Triada-Security-Standard. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x2bb652b76e448d1d94b110f6eb046464a1b347ef 0x70791ec0048b698ee713f66e49614a6860b200b9 0x729b8461763dc13a9c6bbe17b9d94cd9fabda43d 0x272e6e8c67f11068520a2344c1356cbd3b783d8e 0x21d616977f355afd0eab7a1d11c9fd58c8579115 0xb2e5c2240ec2e490c050be8ceb868522929f157a 0x6f24a20295cba5815f7a1789d839401e050ccf90 0x35d813612c70ddd29661720aac48e5d81720c564 0x3a1004ef3ea55302bdefa4ee27fe121d0526f52b 0xff727d1341001739ac1dffd3ae9455ae8467a6a1 0x09829a5046bc1f493dc2a36894c7714766a723eb 0x82690b436260ae5ddee20b52aa761e2250d7f67f 0x1355047e31eeb4fe66b8afeeae4cd5b021977061 0x8e2692b59196f444213a31b21311427d2b4c5c79 0x46ac53f8a8dd32a36daa09fc355f66f8429c91d1 0x76ba1ca3b54e026ad8e9a3ecc55c11b393c0e15d 0x33c2b8e0a9a651e78799f3291da6abc5e7fa62df 0x8d424a35be976f39c851fba2e18b345644cdc2d1 0x8d5e3b89f3fc7c4b70317d15604ec7ff418ff013 0xf4aa7b614129e3fe5dd86d0cc675d40b5835f883