ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-FD3A21343687
|
Infrastructure Scan
ADDRESS: 0x2aedf43c3f0bbe50e8404792d48954be2047e1bf
DEPLOYED: 2026-05-03 03:55:35
LAST_TX: 2026-05-03 04:54:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Pulling contract state from Alchemy RPC… [FETCH] Hex dump completed. Entropy: 5.42 bit/byte. [SCAN] Running static analysis on JUMP instructions… [MEM] Snapshotting EVM state before execution… [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Debug: fc5de664c3a7d6a2. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xc3ff1c3f4704a18c230f58c5dc2af4d53a815545 0x45de9a5ddc2a47c69c1abf8bb59ab31c91652cc9 0xb967131e500c50dda18d3a031dd1185649116370 0x0ff79be91d81ae34624911733c441d9ad37684ae 0x5b4d54837966e71da43d7c77933fe11ccd84f326 0x31172b1d93ed2c6281598bb661a7c1ea5053f667 0xe4d4e9ebbc18007de6a2b948c8270dddea30f614 0x5afaf7092f44dd0965a4e80687eca42ed74581bd 0x9dc0e9b8fde12d9bfb3d23a3b1a8e75f061d52f6 0x63e06dcc6c29eb108b4a5b0c47889e3d063673ec 0x64f53f7f8e16b3d2dc2dd0c47c822767a97daa2f 0x3f24893e2961a2c6e0015d3866770dc79d838e8f 0x95dd0d431037b6ce68a4355217f3cd6f596776bc 0x10e082791fa25dbffe24cc74dab130efd05584e2 0x6ef50c1a8988ca7f8b696791a65d7bea8e4110aa 0x95fe61f42e9f8cb372d13325803fd103aa57b7b3 0x5f598a4b588766c41b0de5a93b91e03f00c60a77 0xfae0893bd16b963c73a733d5d5cb5bf35c41f369 0xb9176a5b5fb5c4244a214de232f811fc50f79916 0x0d7d3c86fbb6fa61c953a5f971c992f96a7a137c
