ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-E5A088F0BD51
|
Infrastructure Scan
ADDRESS: 0xc5f8b5ff2e6299d22dac3c09d597785aaa3caa6c
DEPLOYED: 2026-05-05 14:38:47
LAST_TX: 2026-05-05 14:53:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Pulling contract state from Alchemy RPC… [FETCH] Reconstructing ABI from function selectors… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Simulation buffer: 1024 KB allocated. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Return data: 0xc8d9f453… [VALID] Comparing result with Triada-Security-Standard. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xde820d6d62dc05ff8b0ec00360f0a2515ae85d4a 0x526fbe4720c25c2d367951c972f40fdd4d0d89ce 0x5f11429038f28b44695060fc8889507c67f048a0 0xfd85497bd92e28e066411b5d05cc8a5e03a44211 0x85f08eb93241c0758731b42e0e3c04f3f59587a0 0xdd3700324197b64d29fe3f39b53bc54237af9889 0x2b8e59005dba118a3b73d8b42bc8fcb6c3a1e1fd 0xfd5e024792795b197e717c25e45eb4d8285e614f 0xa2415d67384c60f637137bde163b9fb5ab4ae9b9 0xa658a47291d618adf16a34a91f71b32e98a22727 0x6d5a01cd11755e9b003ae8b61fa5803cff37f2f8 0x0024a107b8e354600ef2b1b319ce1432fd4ec221 0xf23183c22340bf5be499bef016e7f0292409d4ee 0xf3e7fc69f5c5f9e30d93badb24afe1f9fb55ccac 0x4a3cf26fda76b4cb8856ab0e2e035e95d307f9fc 0xc8514f821a3d801fa8a8c435840a992a4365a13b 0xe788c0f5b719c3caba09ce882d99b91a56b9780e 0xb83bc8184c3a93789094c8df580d4354321dd339 0x3b81686d7b1a6fff80de2de29ea00b7b13876aa7 0xfcd385df4a99894c0ee0d9e671e937ac4598a87a