ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-C370214D5E85
|
Infrastructure Scan
ADDRESS: 0x1b2210b75f4c32580db1493cf4dfab7a52c68b23
DEPLOYED: 2026-05-15 19:56:11
LAST_TX: 2026-05-16 10:18:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 1D46CDE4. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Reconstructing ABI from function selectors… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Stack depth: 1 / 1024. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Program Counter (PC) synchronized at 9622. [VALID] Consensus reached on node cluster: 7/10. [DONE] Triada-Engine standby mode. Load: 4%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x7606f8e947a49bb1445422a0faecf64ba5d84fa3 0x6fc38c2c630e5f2a7e6829e4e8adb0cb405fd4e8 0x9e0c6fef39cc90ddf13abfce93504e25a845c76d 0xd52f2551c7abf3deb48f38aed850d262bd5641c0 0xcf28546f1a1cfa122c7f5f4c7642504ad8edde12 0x26e4876da566e9e28f1e882088651922cedab1b6 0xc02a1e3e7488bbcb461ecbf62ec622ab79153801 0xf6eb7c1db14ad142749922ce0bec45b5bca851b4 0x5e06a0943faf5682ba6aad8919758445bf236da6 0xaeb468bee4aec91675bc40a6c86725f06e50419e 0x61441cd83a4cacb868c0db911763c5d04eb5aaef 0xb611e1e16b2fe4fe722f767f864309b9a70c3455 0x23f22ba6dc41875c41e9b90f2ab42b95d6794989 0x80ca3552d8ea8bbf1fa0d63b35729e68228d5cc2 0x4094379465e138657012914fb189f201715eddb9 0x7af4c8b1e209bdae6bf1bbe5428ff7611e42febf 0x88622a24d778bfafa39fa9093c7026f1e8d30136 0xaa8262dc2622df8dfeccd5f8d145ac2317744df6 0xa5dac78aa96b30747c3e2cdb65f1015994822c94 0x52ed24da4e57dc570a000d0bc196e3c115cd896d