ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-3AB9D024A377
|
Infrastructure Scan
ADDRESS: 0xeebfb0291f9639f7879068e9583f86336fb7c4f8
DEPLOYED: 2026-05-01 18:38:59
LAST_TX: 2026-05-02 20:04:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Mapping peer nodes for transaction trace… [FETCH] Bytecode size: 6925 bytes. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Stack depth: 8 / 1024. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Return data: 0x636ce906… [VALID] No critical memory leaks during simulation. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x248a4b5d3e1eeba43c547b14e6a8a8d86ce796fc 0x8e1f3d8453575e5e744c3aab3aa8005f9981f81b 0x75b9ae8e7ea40d30c6f52172e5c9c086b6d037cf 0xd46b62a6f4b7a82da78cac942a63da73406913b9 0xc303e5188ea54ad6ba55c799f9c15c8b34f94045 0x16e783f5d544e9e5f6fcef053a000b2c0c53d418 0xf0c493b1e604a24bdf7ad4773553deb20d99e49d 0x2fa19bd16e18f9e21b2508f6acafa672f94ab019 0x2da0a0666bf3d9d354bf6addaacb80b0732c770f 0xf6c2b9fb70aa36eab9031da25c3ff84fd80ac6a8 0x378606f05fe97ba56886775aac90b0ccd763981e 0x7f1be6e6d31847427e6ca43c8a464285089766b7 0x83a2ec9467dc3e544a4c3db7a0b810d06099e564 0xcc5f4b1a5ec9d1c4ba87676a5fd8753ab0d4dff4 0x3abc4c6d7688d72273648a9aff3b25eb0d7d13d5 0x2134c2bb95607d7a78c875e020d179eed7ee17f7 0x3559ae53a06640401d141f4619d863f1788a2e23 0x8ce62dc74dbda4785116d4b97adcfa99e06d0f5d 0xc34c5174411c1f0ed6a689d1d14027d86e5e2594 0x771731faa0003a14599e5077a68ec93052b4a1b1
