ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-0D2021CA15A8
|
Infrastructure Scan
ADDRESS: 0x310a1faeb483b731377d5e9659bcabb6c3d3ba02
DEPLOYED: 2026-05-09 10:28:23
LAST_TX: 2026-05-09 11:58:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Pulling contract state from Alchemy RPC… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Mapping ownership-protected functions… [MEM] Tracking pointer 0xd69c57d6 in memory heap. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Program Counter (PC) synchronized at 6632. [VALID] No critical memory leaks during simulation. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x4a972ca75355791492c3f5f8adc8d587c2dde3e4 0x606e73c5e1e634bdfb0a3329086248785c3deb80 0x76c447b3114ffa1aa6a7b18c86d61a47ff411eba 0x6b184a26111ab81d90384ed53c652c81db931b18 0x863d66cd5829cbae5215580eddd9525637588322 0x7340a2dbf6a60ec3bb3d94f8a321313f27c884c5 0x9331be5cc56f32a32bf10a7889b17fb44826c13f 0x4bbd9568e7928e46d49b56c705020feefab47136 0xa6b16f20cd0af4b31ff47e3b9dcb9218243d4fba 0xf7b09ae0baa696f7951a3ad5c162a5de803ae7a5 0x986bdc8a02916317de85ca68735c29c3aca18ce7 0x2b30efe4f99ae424322efa5c977aae69da10b5bb 0x36eef6fa7555fa53d81d34d640809bab569e400b 0xe024552b59840c64c510a3312f53348fadf6940b 0xcca17cb38384db8489cbf80c8e6238df11f550f4 0x6012dffd07b3bedd0e8cf59a8117d66fb49f261f 0xa9176525a975ac8b8bbedcb783b192ea0b63bb2e 0x95358cfe43d5cb20348fc9f8441595fdea19a83f 0xb7647729833e946577d854d7b9064108bb428826 0x0e100d26fadfdab92fbfc1c8f2f388e1af38ac40