ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-9D9D8FA1B455
Infrastructure Scan ADDRESS: 0x331369b17d27b24f4f1d7eae245d91002196c99d DEPLOYED: 2026-05-09 11:49:35 LAST_TX: 2026-05-09 12:28:35 | Compliance Status
STATUS: OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate VISIBILITY: OWNERSHIP_LEAK_DETECTED |
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Mapping peer nodes for transaction trace… [FETCH] Metadata hash (IPFS): 51db42c7…c9b6afe7… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Virtual memory mapped: 0x0000 -> 0x8417. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Program Counter (PC) synchronized at 2046. [VALID] Consensus reached on node cluster: 9/10. [DONE] Disconnecting from Ethereum node… |
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x5654850055206d502670306ff3f3ac2be91bf92a 0x37c315c21f3068671fd28b76b84b96131cbe9dbd 0xf4734dbe307f88cc4a1822bd2a3a6af702eeb393 0x820adc1d6315fe6142cb2b5606287fad243de213 0x3ca4aac31890a3c3e4eed97be564f358ed5cb882 0xdaf0e3da7a9560d09673c0164c00989ff55757bf 0xe6c8803ebe2677fb3ddc92c75fe2a9aa11edfd12 0xa7695a962079d0f59c4a4f65526063bbcf2a6fb7 0xb5347575b0709e6dad3447dbe4b0b1957e8ed35a 0x647f05e3ab0e17de8ffb47ca5a62cafbbf49e0fb 0x4451f218ed6bbf3debbdc5a83a416c719bdf5455 0x3c3f773adf9b21dbecd54084c2d0fda44a888690 0xfe1c17e0e8e1403034fa5f3e3e17fca81eb2e12d 0xf39bb87bd9745a33a31510d26c52a4ef6193e6a3 0x5170aae0d2fcf9131f2bb38a5b9b783c450d5521 0xcaa498f6bb62a4a286f7593602157ba255442a28 0xc4725efc5c3b084909dc32b681be46711c74ef26 0xe97f5cbe8bee6521d7f86f7ce4894bc5944c3e1d 0x1929096c959f500b8336fcc9491ac6a2c9f206b8 0x6c0ac00cad35e8830b677c1f115b9f182f650fd8