ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-3E4A5538B07C
|
Infrastructure Scan
ADDRESS: 0x4043223f17a5c4e20f8348befa6a8d225189ce32
DEPLOYED: 2026-05-01 00:50:47
LAST_TX: 2026-05-03 08:31:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 80AC0493. [NET] Connection established. Peer count: 19. [FETCH] Metadata hash (IPFS): ca2a7ad1…8bb957ad… [SCAN] Mapping internal logic flow and branching. [MEM] Stack depth: 3 / 1024. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Call sequence: b79d -> 95bc -> 3342. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x7583e1dcba578be64c73c179f288879280c1442e 0xf8dbf50d4c400617d3a2b1b75e11533fb1895bfc 0xffcb20cea1795b8b97fb29c09f9c2f6b74d33645 0xff083912401eef0e8d15f0aa558c1dc3156417ae 0x370b3ba7635aa627c131b88af28a6b4ac2b39ff4 0x97bb446911e398c5cc046475b8f4a9d204fc5503 0x507412890d06c538c25e6eadde6f9b6c78e4ce0c 0xba42a5754de845445ab3621a4667c6e246d24ded 0x9c51a3cb5094b26aa1dcb380f3dc7e1a7c681c2d 0x74fbdf73c3219d87faec7d471d0fa3938c4045d4 0x8dbdb7d9684d96d74ceefd085006d8e30caa1c77 0x21ca0a83a50cc53c051a4bd5a915b47adb2c989a 0x9071c2562ecc4f443b421dee60b824f0500b6761 0x0c4bc44e96788dce571d9e255423de47f7e126cd 0x5c6263904ccfd3bcf1aaa6e7063ddd29743b3bb7 0x937e4bc27243d43785cc34bf073862e80ba2becc 0x5cfa54f52aa87b597ee85cc5f7817029ea751601 0x0c34317291893b92eb51c9d2bc6d71de75e853c4 0x76e525edb6ac7b1eceb750dfbe3c5db849e4f457 0x0674adc7cb2841c0a8a98d84b2a10f40e242efd8