ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-D061D6D958B8
|
Infrastructure Scan
ADDRESS: 0xe7dfe204b545704839e3eb109bd6ce91684c17b3
DEPLOYED: 2026-04-30 18:10:47
LAST_TX: 2026-04-30 18:37:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Fetching raw bytecode for 0xe7dfe204b545704839e3eb109bd6ce91684c17b3… [FETCH] Metadata hash (IPFS): 6d142475…cda1c04e… [SCAN] Mapping internal logic flow and branching. [MEM] Tracking pointer 0x658cc953 in memory heap. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Execution path: 18% coverage. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Scan task 773947BA finished in 98s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x083b10ae3dd7d331af4ad58c4c415f9d24f2aa40 0xf6e1f3797991c5a3420c61acb3bf35f218e8f244 0x0dfc52f032072a9f1a95bf3be250512fcb42d868 0x7c25ae68145ed5b78220c58b2253f009ef590ba0 0x790d639b96fd3421b540b05ceb0727229ec54160 0xc4c139852a71b4c4b317a9cac20dbb0415f3cdaf 0x0d672c1b9452fa3c281e2b1ad8f50f9ac486f48a 0x9afde2fe69defad2fc4184b49d045abba580dcd4 0x66989f3ce2195f9210d17e118c0d20b26ebef017 0xff546d9526dcbf9023d9b10ea585f9722c3df204 0x7a878e2d6c0a2bd1ce31f9885d6de934ac7c55a4 0xac5ec5caae727194db2524d3e72b9663def0c7d4 0x3221efb5d910344e21642d2b988a83a4e9871176 0x970e9b1ea0a2634917c2800a589b01a5866eb4d5 0xbe713b6407d0e77cb4c122a78c16089d05fcb3d4 0x816e79a1ad73b9dc7dd4f08ad7b606b08ef553ba 0xeb981e33aa569f9c77544ca73fed11f79018e968 0xd0ff497cd60d33f2521184c50f485e79f21b3bc5 0x767a8573a047ee10df87646325d9b631d2a229c7 0x5e74b30f13843ae8c20f7ccd605439ea956b8f21