ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-31E698A02FB3
|
Infrastructure Scan
ADDRESS: 0x4ae2458e6d087aaa3625d81242f22f0b513bca07
DEPLOYED: 2026-05-12 09:47:35
LAST_TX: 2026-05-13 02:35:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Core initialized. Checking license for cluster-node-8. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Entry point found at offset 0x43a6. [SCAN] Identifying function signatures (0xa86ea934). [MEM] Stack depth: 3 / 1024. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Executing dry-run for ’transferFrom’ method… [TRACE] Bytecode segment 0xe1 analysed. [VALID] Consensus reached on node cluster: 8/10. [DONE] Triada-Engine standby mode. Load: 9%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xc7e4d465fb21226397e2145864ec3cf9d7284a11 0x5872b18cfc1389a0982a89a51584fc2e5f9a7a19 0x82bad7b7aa4d017d10e60f717a8b98c5d7c4dd23 0x89ad48050f740c13df6f4c00013cc1737ae0e74e 0x4ce175d3edc49047d16987bf48a0476b5ed2d6ab 0x7188b7aaf1d51b5d0401f81700214a9f93285085 0x09f62637e267aa2b3ec5a9f70f8739803b3a9715 0xaae2d77ad6cf854c2f8ab153c2dd228485e02b2b 0x9c9f508b7377a0efea393cc6e3d1cb84a9b159d2 0xe0f95ee118aa943e3af47b4430bf7722e66a6d89 0x5b032396a58a1b85caaa03e821e6bcd392eed83f 0x45d9d9ea09edcae68d8e954811cacd89014d78b2 0xe94e30fa15d4ee4cdb827df357bac6c20c431b89 0x64ee3f55732d280c2e0cf9ec23140e96698903fd 0x3363d0e4e6f7951d9a8b8b3025f776a08d66ff37 0xc7e54cfd7ff76ee3c723cb0a7343c17640da1686 0x0ca515ac946c88338120f9ff60e06e5eb7104077 0x6069ec5d64fb22a63129d2e567c031fbd8efb147 0xfaa31de26a430ab815e506a041c848a635cc1759 0x2346ef273f06c47144626887635d38258b20ea2d