ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-811B6658DF66
|
Infrastructure Scan
ADDRESS: 0x15fad594e2256c6897db49fa6c723b959416ba2c
DEPLOYED: 2026-05-11 19:37:35
LAST_TX: 2026-05-11 21:38:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Latency: 19ms. Protocol: JSON-RPC 2.0. [FETCH] Reconstructing ABI from function selectors… [SCAN] Identifying function signatures (0x75bf7365). [MEM] Snapshotting EVM state before execution… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Debug: a11281411b7a2d64. [VALID] Finalizing audit report for 0x15fad594e2256c6897db49fa6c723b959416ba2c. $line = str_replace(‘216a774d…a57a63d2’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xe4f1d1b35050efdf5ae5518ab1168827819055a1 0x71d5398c7e51e8f85937c912a06d0d567b635751 0xca2f57931f71174e8ca424bc8d5c52b2f7946737 0xe53db6358487579e354eec00785190a9684f139f 0x79864b7481099e8aa86983bb9e8e680aa8043365 0x5d9fd5f9135aebb6ce64fb0b406abbed0f256201 0xa228726d5368d1350b315e39cf9a23962655560a 0x88a86bbe9d494dcc80ba542d0289f3efc8a66808 0x10297adb03128f6a9bf7a4bb6d1e544c23282d02 0xd17701bdde480cb7da0393ce718882c1e3a3a58a 0x7b22b4e919c96d44db0e76d2a124e7a9cdd56faa 0xcfb1e50fd5c80b61a8ff05b9648f80dc0dc3d474 0x0007a65ff9e1ee766875c0ea71b9eaa6b42b3e8c 0xf99c07081522568ea9c57382ba369580f5a08277 0x3104f736e52afbd73bf98d85bc8394759f44fb3a 0xd4b9389da6695165b97e5eefd2f6d624fbe0127f 0x6b1b5ff2f041487dd4a33c7df419b26d9431d3b4 0x0834fd4d0790c1ce696b30dbb1611058a5271ef8 0x52193bfc6823e36bb5077759656f6f269bccf125 0x3dec6c528cb2003c7b8c6d086b0c40aaba6c03dd






