ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-E4416556C2FC
|
Infrastructure Scan
ADDRESS: 0x005d1e6380ae8f1b69922ef52b71a99c3fafe733
DEPLOYED: 2026-05-06 17:35:47
LAST_TX: 2026-05-06 18:31:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Fetching raw bytecode for 0x005d1e6380ae8f1b69922ef52b71a99c3fafe733… [FETCH] Received 24 segments of contract data. [SCAN] Analyzing visibility: 9 public, 8 private methods. [MEM] Initializing storage slot tracker… [VULN] Warning: IS_DEBUG_MODE found in storage slot 78. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Return data: 0x47d43858… [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Log signature: 6cce18401b3fef4779b08ea5c8cb4c88e3413406141b332f3e4689da63ba9277.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xa2498b608cd6c51ee93bab8d52371a150f90f98c 0x1f937951185e3dcb14ec54ba6b384c0b5d94891a 0x191d6b8edd19167e90419347d586081e2b01d8dd 0xcc372a5235bcbabc40d46a29c118f41d6bda3dd7 0xc025f03c3a76aa0956ca5dce9598764e1f326529 0xac1889b692c07558815f3fb4fa449a5e12872abd 0x794c8990374d3cfe9667fb118b08700f989bee35 0xb01cf4630b10d5f0a593c630bb184ae5b497a509 0xb7e8a0339d56b849a90f3a22697943f389ac2e6a 0xec02746ce1daac82d513343fca7cb1074297a3a9 0x5cf60c6db35b50c343e51bce3afee6a81454208b 0x5e756eb4f114746daab9fbec39070b38c3254b86 0x06ff6b13108bb2a1e7d60708b0e40a0bb55993c8 0x66cabdc281b1866e17871acfb3eefa947b77f0bd 0x133efcbde6b513e2e4f7adb87c4e27b651e4f42a 0x64a8518985b1b91812b85324bb0177f272998192 0x5dd773c0e09a9300346d47583f7bbcd225b2128f 0x5b766ed85b20ae3e0cf4bc7887d2a1c61747cb66 0x15fb28be9b4c0ae1769933c1bab4944ff0f7e2ff 0x447303d3045bf387bbd21ec32f447f40952d8e5c
