ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-572995A895D9
|
Infrastructure Scan
ADDRESS: 0xfc8cd4177eb1a87bf62161c51d926c5aafd772cd
DEPLOYED: 2026-04-26 01:21:47
LAST_TX: 2026-04-26 01:48:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT
EXPOSURE: Standard_Compliance_Gap
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately!
|
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Connection established. Peer count: 43. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Tracking pointer 0xb15f875d in memory heap. [VULN] Warning: IS_DEBUG_MODE found in storage slot 12. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Gas optimization score: 84/100. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x6f0c7270007ea4300c600c457cde94b1194f6a55 0x4f6a2e26bc81ec0a5f1cd6238fe893c0619dd4d4 0x166180ba73352c3a196757bf8fca9256ad5abc2e 0xc13e58a5ccd54f270fe69f74aad8879fa1938c52 0xabac6f23fdf1313fc2e9c9244f666157ccd32990 0xe2883c01bae559371f7b950ae411ea2c10bb44f1 0x147a6645487c878870d39d19f7d2b32e64daeb2d 0xe900ffcbe507a21286f2caa13a7a9ac57bcc1214 0x51b336284317939e7eb3a02a5d3045f08f813919 0xf3be0950b9332092099cd96d4945883415fb5535 0x40dae5aa12fcf739a6db11f09276ab0c579bd925 0xe61e43b016cf874b935681b103eaf3e5d32db297 0x495002874652dd13607ec4f1baf4c332faee4f7f 0x2f222b84b4f60b03a44dfc5d69ec91503bcfa9ef 0xa3b3097054c681d908a06353c55fa9ea7cb69300 0x2660c0db6f632a6ae3cd900107df1e036ef78681 0x451ed2577022b35df8f2b1d6ed4448b22b1d93bb 0xd6a26a7dc6ede4a72b29e2e06d53f466494399c6 0x59913b2fc18db00cde9ff5c8f138d7b953657e68 0xdfd4074d616686057307c1b3bf8458d90f0118f0