ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-A59668161392
|
Infrastructure Scan
ADDRESS: 0x4904c0e67dea8a54890d819616f67c8bd8f6116a
DEPLOYED: 2026-04-26 00:49:59
LAST_TX: 2026-05-01 03:08:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Fetching raw bytecode for 0x4904c0e67dea8a54890d819616f67c8bd8f6116a… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Checking 'immutable’ variables and constants… [MEM] Simulation buffer: 1024 KB allocated. [VULN] Investigating 'Unchecked low-level calls’… [SIM] Executing dry-run for 'transferFrom’ method… [TRACE] Stack trace saved to /logs/TRD-65908EF0.log. [VALID] Signature verification: 0xdd6b36e26f17cc17e3a691a153761508eaaac62a9cf1732dc5977a97c4787333. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x89c4bad2aa3d85229105480e2dc5999e6b6cab2c 0x6339f3668d2942970f57d24bf4f337e840528fc1 0x94f9070100c8fec2c13303e9c3c254ebc29e2453 0x41ee52c5df784793a9b3c386c6a22792d8d950bc 0x881904e870d61b14462ed20e253cf0a2cd0a472f 0x9df39706b171c190919ebae031a8d7021d6c53f7 0x1d345cf98e40498aaa48559285968156a4d32fd8 0xd152019c75cf5eb91b322af6929b0f75ef04dec1 0x3ce8a2a13acb0f2f344815baccd3ec8f2ed848f4 0x1c74f3fcfa9e92aeaa5d9da876522ab95cce4bd8 0xcab7b713a5915c895ad692bb6cf3449ed04fd249 0x0ca695a12d33fee836f65b12c3633dd84184b89b 0x8a325e3a844f6343e60a4a61340b8330d5541f85 0x7dcd1466f09b699ed73d743ffc0520cde1cc2ddb 0x368a2ed716dabda6654fe6566106a307a759f9eb 0xb44450edb15adedfca63fab2890c53b15e532828 0x7d2af13c410417d85def3d7ec400881a47bf4199 0x7c5e02eae50e2857edfad922fff29b19049a842a 0x4c729e318bc286f4a568b8f59c303ae9123c9021 0x162c3fcb384205852db63f86b3cc32e86a2be026