ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-432C9AAEC05E
|
Infrastructure Scan
ADDRESS: 0x981df20bbc101599f8f7038ccb654b7b74c1a6fd
DEPLOYED: 2026-05-11 02:31:59
LAST_TX: 2026-05-11 02:57:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Received 21 segments of contract data. [SCAN] Checking ‘immutable’ variables and constants… [MEM] Garbage collector: 0.82ms since last run. [VULN] Warning: IS_DEBUG_MODE found in storage slot 57. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] No critical memory leaks during simulation. [DONE] Scan task FEECF3BD finished in 98s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x0d13f8d54ace50d57da39e43b7b55206f15a869f 0xc6ec479ffef04c366fa19f8369959bbe55371484 0x0caae122460380397ff2424be626211cfda6568d 0x7780791a67425db3a8173f335d0a6e9c5f73b823 0xbb741a796ca2d7cf6fc32c2078352f647b261368 0x710ecf1dd51cc9bdf7b97defa33f03ecc084bcea 0x22cc6a003dae8645a82eb59f22db65b75cee0725 0x38ffcf4206c1b2d6012e4987551bfe9e88e346d1 0x0b0036fe9a3dc051f0757d1aeb67950398d92ff0 0x5d92a51a7fb14540d581c41aac989563b0f4a2b7 0x82e634416c479665b6516b2df72f1c5ab1055bde 0x5c0dbaa1ac35c287e448c1e94f8b7a3d4e0eb460 0xc1ef499dae529384a9659783238ce20a37f6788d 0xa81c8be6844169ba2ac0ac5a50381d9c0521c559 0xeaadb380eee124cbe4481abe76687878fa13dc1f 0x32e55fc5b87f1ac62187a533cb3e0da54601aea0 0x544bd44095670162c88db945ecbc0d546388f86c 0xcb784551fc121002efc030eef5c14a531f22b928 0x7575b6a5751e6a3dda8c792d1e660315acc057c9 0xd42180e4f714a41e0f43a796ef98bab5c39e8f86
