ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-44B45BEEE9B6
|
Infrastructure Scan
ADDRESS: 0x5c72b07e76bca2820204105ecead3cb6ca110dfa
DEPLOYED: 2026-05-11 22:38:23
LAST_TX: 2026-05-15 05:03:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Requesting storage slots for offset 0x00… [FETCH] Reconstructing ABI from function selectors… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Garbage collector: 0.25ms since last run. [VULN] Potential ‘Dos with Gas Limit’ in loops found. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Debug: 95562d67da8a0128. [VALID] Consensus reached on node cluster: 1/10. [DONE] Triada-Engine standby mode. Load: 9%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x703143558a56b558716847ad2b8db2bb4afc1601 0x8bae586f7899df13d6bce0831971b82b53af974f 0x1e485d34fa3f2a34216c1f89e9b850bdfa3f2a71 0xc34f751ae98f7961b350043c69ac2d83dd454733 0xd631fc627edff21b4926fdfbc4deef4624a089ae 0x23d6f7f508f8486391c781cd4777438da2ef4ad4 0x243e0f790aa9427cff7f701c1cd1deaf272e6f0d 0x02de47f16b58cb947349de9d24f333be104895ff 0xa3fa09686137595bbaeb66dfa5d7c1545d616cbd 0xe89bf1c8373b2ee9b071627deae8169b94582c86 0xfc166286644964dc09236c0f00757f6448b9a727 0x552171a92e11c4669e7907110ad71a1f99456e90 0x66d6f4e4c180284291d90835e268d4da3f5b830f 0x19bd9ae8fc18b40eac980e127819e52eff27078d 0xaf94736d1d1ac72980adf5f810f2fc63733fad95 0xc7e1fd005ec599229c65ff26bcd90a00815eeb32 0xd335e56be5b6546218938a0ddc8da50e04535b55 0x0a42115dd5cbcec5816d6513d1e920a1f5870dae 0x8e70df205114fbbd1d4abe999c17a90ff6554978 0x5e51f77372680798301a6e38c82d2a32c15cf89a