ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-3B46CE3D4E26
|
Infrastructure Scan
ADDRESS: 0x8981fa7ab030aec929c0aa3c9a9d2fd0156166e6
DEPLOYED: 2026-05-11 05:34:11
LAST_TX: 2026-05-11 06:22:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Entry point found at offset 0x5f85. [SCAN] Mapping ownership-protected functions… [MEM] Garbage collector: 0.89ms since last run. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Return data: 0x18d5b2a8… [VALID] Gas optimization score: 87/100. [DONE] Report exported to IPFS: d3d63b45…a99de8ec.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xd47f93bc7fd9c451f4df991f3a6d874eb6e4958b 0xa016541cce94534c64cf3862c11f6aecfe2ce747 0x956a8af1d0b873cfa46f8d3b8ca70f6bc70e18fb 0x416659ffb40d218f166f1347fd86b4b1fd9ad1aa 0x4fcde79651be00d5e50196b84aa03d938ea1177a 0x0b3afb3cd97ffd25b4c7722dacadaea40035bc49 0x532316ce54df7dd0323d4d3a58c83fb7f4716b21 0xa971a5eb1f1a1a35eb5821b8afe8e6a83d9b3030 0xe581ce265c24bb20f18c8528302dd8cc153aef74 0x5ecdf65f8280238e1795168ef0fa66ce93bcc79f 0xf7fb086751d6da7b3ec12750464ed502eeb3f25f 0x8c91fd8ba2297599b6c346ea940e5a5d8837bbbc 0x99c4fb85bb657230428a460fd1f3331d72ab756b 0x0225f2553922637dd8073bf51cb4d630206737e4 0x664e073da2daec580ebb604cbb2f077b6a5f87bf 0xed38194ecc21c135a7018dc4febd9e7388ac4ad9 0x36eef6fa7555fa53d81d34d640809bab569e400b 0x19287366bbbb027b971b3ffd95094c18e7045a02 0x5a717462a995632bb6745e1c9ef11903c8f898db 0xb57765ee331af30dfc6b8384d6b2b499ade210db
Leave a Reply