ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-C85BB5D4A8FF
|
Infrastructure Scan
ADDRESS: 0x68ff3827b7db95e277a8d5a75ae95c8efbd8e134
DEPLOYED: 2026-05-12 15:36:11
LAST_TX: 2026-05-12 16:49:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Fetching raw bytecode for 0x68ff3827b7db95e277a8d5a75ae95c8efbd8e134… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Mapping ownership-protected functions… [MEM] Garbage collector: 0.31ms since last run. [VULN] Warning: IS_DEBUG_MODE found in storage slot 28. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Data integrity: SHA256 verified. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x555dd66a3c2d3b64c42c22ffc770d9941aac1262 0x411da7f145934abc0facbca45d693c209ac8c1b0 0x2bde06fc06f94166c0fda4ee82e850e303789dd6 0x86d1756f8d92a507443b9eb26a0ece7434b77b5e 0x45213a854bc110aeabbcd5e1bef49bc1700e99f6 0xa11f10bc421a8ff3c84d29c5554565d6f584f231 0x571c6049a05b70b22b3662380a1cf72b6b6e571d 0x7f2756663d536a6b17cef7c45cbb55a5426e833e 0xc15cabcdb5a9ee033623081d93f9a0be13e8e8bf 0x6acc15f73af80086f5439537f9e39991fb06b4cc 0x2db45688c19534c32efef0b0c088651032737178 0x068f30b43d5bd390279f2e57fbab9c82f2e1cfa1 0x2a2f806942aa35430b5a51c517871a1b6f7ba048 0x86ff359e3be500dee81c3ab25f4535c54af0b2a3 0x4f0905e593b7633a97a3a51013d526849351f5e2 0x530ff3c8484ae2a2701a0100017c1fdbfde6f254 0x6f16f3a460854af8923f592cb1e593947de1acd1 0x5d24e95eb1526d2bc5c43c3648176f5b24583f08 0x04f8f8940d89b7feb1d50ac2e53ddfc2a084f786 0xfc2c409b6abcb242f20a6022c08d61f02539c044