ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-A804C91816B4
|
Infrastructure Scan
ADDRESS: 0x720ffa854b966f1cf7080fb24db958e2a9e9f28d
DEPLOYED: 2026-05-08 12:41:11
LAST_TX: 2026-05-09 16:26:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Requesting storage slots for offset 0x00… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Detecting compiler version: v0.8.62. [MEM] Virtual memory mapped: 0x0000 -> 0x4d33. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Program Counter (PC) synchronized at 3019. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(‘f8f557ca3c7e62c21a2a6702f1c965e86f81fed8e961672353a1fd93036c867c’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x0026af3e09f24f8e6193376f985055d6acb6a176 0x48964ac3a4e98f2b2345261ea125e545252fd8ad 0xf2f4484d6abb3b80bff15f20102396bfc3169330 0xc01ed9e31bec228d307a7e24aee190783be128bf 0x0974e49da5069d75fd8188cd22f8e2a4526edd15 0xf3ad5da90e3197296b9595f645d66df63d224fec 0x4284df951878e3c35dbc56c811004b1784ff9ccd 0x182a893b967e4131a093c516a3b43884e8a0705c 0xc21e809b7743db77d9b848ea3b2b4921150d8cde 0x254095ca4ea08245c5fa0d4bb7d01a73f8285c9e 0xcac639d17193b6ebfe8dd23b07a0c0e7bcf167b8 0xeb4aa44aee216b91bee2836b1d5a779d31485cdb 0x6bd0e77894e4a559d42739753cd68ebbacf3ddfc 0x2a527742c27acedebc33822dbcfdb61e374187f8 0x1f93e58854cb8c338031188034c4f0d5cdd73f63 0x62f5907e2d02527a1fb81dbdd28419898fdffc7f 0x4bd26502dcbdfa59c7f7f8cbf9bf2d7462c4830a 0x506e8df8acdd02056b53364153b5ad0a8537d0c7 0xf71a9877aa0cd42ae5c9694c2a3228b7ce8d7329 0x9d34b4c8acba2544cbf87e96c072a3cd208f199c
