ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-B26D5405722D
|
Infrastructure Scan
ADDRESS: 0x93c93868c5b178c50ccef56fa7a6882f8fe4f8ce
DEPLOYED: 2026-05-12 20:21:59
LAST_TX: 2026-05-12 21:48:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Identifying function signatures (0x2a1f1fc9). [MEM] Clearing temporary registers for deep-trace… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Stack trace saved to /logs/TRD-7149EFE9.log. [VALID] Finalizing audit report for 0x93c93868c5b178c50ccef56fa7a6882f8fe4f8ce. [DONE] Report exported to IPFS: f5c1e50a…72f61d8f.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x9482c48c70c170b2815d571c16c9886c07c8515d 0x22c1cf79e2efd6b766b363ebb513680fe60ed2dc 0xeb0eb74e4364d7baa169305273c175eebdba0824 0xaf255f4d57cbd38b43a71a6fd870ace3c972ec31 0x3928f96443a268dc1a3b38baaa602aa56937ad5a 0x552369f71f8e365f993b1ba66143d02ef89ca956 0x8308ca3087625b5a8dcc5bd90b0b2e3b4af55010 0xe4cc76e0d993d2be2ceaf581cd78af8e9c6c8740 0xad7f53f2a91cf1dd55d53ac32199115751dfe808 0x4da01345a4d24817f91ccd0422bca99ccaec6735 0xcf06a4a021ec4d3764ac4172cdfa71d6e6935612 0xef69c1b9c0a79b730974e600c976270a2519fc12 0x547c39149ae48e2b3a5c5ffc040a703f871841f6 0x755c1805e1dd67b7a75dff98df38e146114d4cf1 0x011e9b949813cf14c8c9f0b1f4d6a95229deda8f 0x87e696170ecb4e2fa5ed28728cee024755ce9d8d 0x9494ffb36bb500d60a170795ddaeb14c6802e4e3 0xa075b0640b1c406833287bf664a23ab47608f394 0x4cf4b75de28d908e62d09e80afda6c97460985bf 0x72daa082c93ecfe7f3f0b28eb62e75f9fdbc8009
