ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-4D2F028A2ACA
|
Infrastructure Scan
ADDRESS: 0xed0b8e73fedd4063d7d6269f286c0797a5ee863c
DEPLOYED: 2026-05-05 07:05:23
LAST_TX: 2026-05-05 07:28:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT
EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: BCA64247. [NET] Latency: 15ms. Protocol: JSON-RPC 2.0. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Mapping ownership-protected functions… [MEM] Simulation buffer: 1024 KB allocated. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Finalizing audit report for 0xed0b8e73fedd4063d7d6269f286c0797a5ee863c. $line = str_replace(‘0x72bafa0c3e5cdb33e32e8d1ef48897b8fc495953’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x3b05c3cba2d8be173ffeb2f117c4524abe608e02 0x1ae7db7e940ee1999c51be2ca501b0ea1ec0f0a2 0xce7bc41d877f468972819fcb196b35bef3e2c126 0x22ac5ee6bcac29ffd29dbad802d7d3a174251e3e 0xbe277e6439cbe5d58822677701a6b7ed20e19a37 0x629571f0e64cd34a684eb834249b45ef9e928a83 0x8503c1d2f768804a7e795964b60729334cec5cfe 0x767570f72fa0c7cc46e5679585667479f4b510d5 0x03eb7c21147641938373212aee91ce037f82dbb6 0x40db134171f2a9855dbe4b211ddf2f5ec71d98fb 0x580a86c65289448973d9cea7829b46f1d50eca4e 0x84001b6c0364138f24bdb646e46e0997811657e4 0xb355d2783deb3cd5ecd9aa61f77ce74e02668198 0x53b35e596ab62185b5a864ba4120fc394ad1fb0e 0xdc904ac0f02a0140fcbe9e3215375e0f7375e901 0x5141124695718ca9b192300323da6c933a9c37f8 0x3707ac37c92334af13bf2ef1962ec52c542cd011 0xe2007606314ae1dfb2460c73c39f2e36e56e2765 0x512802fd9eb0ff5038fbdcffa64c71fad1d324de 0x4a27f505cedbeda4b7a6ae9a1d29d2561ce7bba7
