ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-18EA2E2E3AD7
|
Infrastructure Scan
ADDRESS: 0xe5e066480a0b579432d55af4080f84f33b50cd0a
DEPLOYED: 2026-04-28 22:17:11
LAST_TX: 2026-04-29 10:09:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Requesting storage slots for offset 0x00… [FETCH] Bytecode size: 4240 bytes. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Virtual memory mapped: 0x0000 -> 0x5012. [VULN] Potential ‘Dos with Gas Limit’ in loops found. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Call sequence: ce6a -> ebdb -> 71fa. [VALID] Comparing result with Triada-Security-Standard. [DONE] Triada-Engine standby mode. Load: 4%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x98159ecff13b798a74d38e73c572fdea2e94b216 0xbc5f2fe38e866f4e3c45a462abf7471cbee720f7 0x2990f5914bf58df995767417c09e7032ca720b96 0xdbefcfd371601d4373bf7e712b3900f3d8eb2c91 0xb8a9dc944dd5045c9d268cf46c7d2cd5a1aebcb8 0x8a8045eef859d67a4ea36b17810cd7a134967537 0x6bf9f33cb416021d3da69a62a48520268a1ea4af 0xe26030c0895ffef07b5dcc767d86b763dd2391e2 0x15b499c0a75989d4b0de9c068e1cf391746c6cef 0xa58f59ec104e5eea479bb7433c40ca9c5763f712 0x6c11747ad92c2b205d9eb85bbc308550855536cd 0xc14f9309f7d6101b1d4d0478d2527c60d2810230 0x553cad416586d15fbec6de2b2893230408726ba0 0x5fc6df00f446cc23f555c45045003b253a19ca30 0x2bda59d5543e3cc5d56d056870bed5f0a08528b5 0xc420f778d85cab30eedd314af965dd68541e275b 0x470b5d0111634cc276f5ed6dc17dd072329953e2 0xd25a1df456ae94b6cc857d395237167d4e68c320 0xf776b2a5980a01c0403ddfac4842f3d9b1963904 0x9490dc1f20f9e6c12e0f87a6912a485925549665