ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-34EF74AB003C
|
Infrastructure Scan
ADDRESS: 0xa8d106bc2d11875fe2b1382e36c07d22c544601f
DEPLOYED: 2026-04-26 06:39:47
LAST_TX: 2026-04-26 10:10:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Pulling contract state from Alchemy RPC… [FETCH] Entry point found at offset 0x034e. [SCAN] Running static analysis on JUMP instructions… [MEM] Stack depth: 6 / 1024. [VULN] Probing admin methods for ‚Access Control‘ flaws. [SIM] Executing dry-run for ‚transferFrom‘ method… [TRACE] Execution path: 26% coverage. [VALID] Generating cryptographic proof of scan… [DONE] Report exported to IPFS: 4a7d83d0…deef5ea2.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x0f29ba17c51346a5dc201b1539cad8a990b9b1dd 0xab8a2cfc2e4ca8f44cbd0bce309a361bb4c9aeb5 0x9613c4b9e615b7835976c3eea7bfcd042083c408 0x1d158a27aaac6bd1822193d3d83dfed720dd78b3 0x24f22aa1d8ff3e89afb7f09cb607082606735d30 0x0c0c2510bae687746a54fa4039cd1ecdc18df7ab 0x5829e37ee1c732affe56cc968313d2b260e6cbe6 0x5d5565c0b4547798de3165110030b2b7ec7f3bc3 0x22340575bf56b91b5b401287c3821e263566e54b 0x5553f6fcfec0351d3654e127ce2bd1cf52f9e3ef 0x6ff5b769d83471e6c3f36be9d1df036c3fc0b7bf 0x74fdd2e08619ef3c007298d711a080d969c2100f 0xfc43a53fd9b5807396136f2246c157bd2f909fab 0xf35bfddbcfbeb19ceb4a3e0669662029fefbec66 0xa6361c1c73c7ccec77789abf6f80b4f162cb592d 0x3148bebbdd59ebb01b4acb2f552ac7f0e4f2a3b7 0x05783b498cd2ed815e7f11acd352e583d4c71721 0x64a896a2c5132752f69a12e227c99f334b10dc34 0x882bbe353dbe4d583855394fadb64ea5cda43a82 0x1ae4372a8149de81df967354f1e15355c83c16b2
