ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-88DD8982BD0E
|
Infrastructure Scan
ADDRESS: 0x57ba0a40436401cec224db92bcf153623d99fb9f
DEPLOYED: 2026-04-23 06:24:11
LAST_TX: 2026-04-24 13:42:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Handshake with node 0x6bee0ea0 successful. [FETCH] Bytecode size: 2569 bytes. [SCAN] Identifying function signatures (0x02875770). [MEM] Stack depth: 3 / 1024. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Return data: 0x79fb24fc… [VALID] Finalizing audit report for 0x57ba0a40436401cec224db92bcf153623d99fb9f. $line = str_replace(‘504102db…d17c2634’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xe729e40e91f891a343ac1de3ddead1de1f586640 0x992c014028f095ace3ee527fb6d2e021ace7a050 0x418ba9192e84c0e211f8873c4b30f34795e718f3 0x1b416ac261f72eed2c607f27392a3e5b399e23fb 0x0b745c5e9758e00cd4918746834c37cc83ca3877 0x731eaed3386639719b75b4710bc8266e6e364c93 0xff52854d561e9ed56c51e4bcccc6e15bba1d35bf 0x523467b38b663e3829ce778535b32a2a6c7190b1 0x5bbddd836f5e618d0324fe2c82454394009b4afa 0xd49162a9279441f9f12e199b0a28499fb85b8fb5 0x65267355d48bdb27f296f2659aa7f2e6d8dcc004 0x69cb6b305f00432da08854be779a0da47413c384 0xa3a2bc60c2793cadfc2a1ac9a2609b817e72879c 0xa723d4e8a3ed629374a6700682dc26adab7c40da 0x478bf562b2a39ff8530ee41ff0dfb39d8bdd2192 0xc0c1ce21820744e02cb4f8d3428b37313e1cf182 0x30bc5dba1cb6a645e7baa0607bf0494617d150bd 0xaca43f9f4da2b7584beed0ad9d442f6c2645f534 0xab64bb50e4ed990c9f7a064b6955c8adc59e45f6 0x6ac59194f77195e12a8d7f017a1195bed62b3d93
