ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-871B703278B5
|
Infrastructure Scan
ADDRESS: 0x6f2c20bda2c7ab0d3f1032cc48e5b1c6231c96bd
DEPLOYED: 2026-05-14 04:12:47
LAST_TX: 2026-05-14 05:19:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Fetching raw bytecode for 0x6f2c20bda2c7ab0d3f1032cc48e5b1c6231c96bd… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Identifying function signatures (0xc555518a). [MEM] Virtual memory mapped: 0x0000 -> 0xa277. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Execution path: 69% coverage. [VALID] Consensus reached on node cluster: 6/10. [DONE] Scan task 223DF2D2 finished in 65s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x1b9e5080ac703757d58aff76125af02f36282f25 0x516d16114ea66bdd41a73f46b86a27ebb3de85e7 0xac102aaf049a1e4e91d9ff200c7058ef3c0eb74f 0x7d45e954a3fc3843b1da0be0b2c3087a14bddbd1 0x3b1f69955a7f39d298083f3e60ea12560208fa08 0xce3d4fcc5256f6a6f2f8321a05cfb2ce35fd38dd 0xa9e2af36fdc8dfb1aeb51f4a7dea53cd03d6d31d 0x77c38547ec5018c9e323b9a14b9a4ea53226acc6 0x34bc7f4cdd3444b650b83160c7b02617641d6889 0x379bc480dd7c34eb3a0f84f84259caf3afcbb5cb 0xda5bb303fc33eb2840a85483f1a8b8e7d15d6d9f 0x7e38e3f5afaf8b1ef869cb8614a7a6ee99b083aa 0xace28b8295181c77feacdf046741a2948a8a2314 0x9d78a3f08673cf18ab782c461665647715b373a0 0x08191954e25a231dd70c026155cab058677d29d1 0x7215aeb59d8a8a86afd56423a716e6bd872e7906 0xff8f4e3f6d6c07fba8d3a24e3ef3939a95c56f2c 0x6aaca171600caa376587f773571346fc5c5a84eb 0x526da493d925cac4f8617e410dc315b000521112 0x4af5a3b0c6fcfea39571f2e66c3f01a5403fcd05
