ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-B60E0755BFB8
|
Infrastructure Scan
ADDRESS: 0x6f6208392bc229344f87b954e53463122ba20303
DEPLOYED: 2026-04-29 10:10:23
LAST_TX: 2026-04-29 13:31:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Validating EIP-standard compliance (ERC-20/721). [MEM] Simulation buffer: 1024 KB allocated. [VULN] Testing for ‚Reentrancy‘ via external call trace. [SIM] Executing dry-run for ‚transferFrom‘ method… [TRACE] Debug: c19c65b83a951e79. [VALID] Finalizing audit report for 0x6f6208392bc229344f87b954e53463122ba20303. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xfeb5dece6582167dcd5556a872087cbc4b48e539 0x1c4cdf86e718b63581c1b26a2ad815eb6d41c064 0x092267a86cc4d0fbef351dab5283532ffd8a45ac 0x20b07e2a5c45ae126f795ab7bcea9503a0caee46 0xdb0046f07aad56fe8ad041960f774df4c22ab1ae 0xb6e189a9f54b2fa35bef8f78d3af75c4462bf8b5 0xb9f3025d78c486e73d0d42862a0b2f6799402ac2 0xe2883c01bae559371f7b950ae411ea2c10bb44f1 0xef25da5264de2a8e6b543768b22bcc8befc3e7c3 0x421afc79a7d2d341bbb928e62c4645e9d8c55f26 0xf64645dddbbb16984c51108bfba08f9acba5538d 0x3c047b90dd55c7d277b1c464bdfde41154ae0b2f 0xb91339a885cadf33c7d001726aca1398cabccae3 0xd262c224402e9a7f5e8ad1621be1bb1f3203b6c3 0xa58905dcfc2cbcd83237024643514372e7a11c6a 0xbc1b041fe54d0a3ce2ba2790ad59036dd801e5dd 0xdbc41f6599dfde58d47d27721f2f6ccc9d5c2669 0x2c4c371eefe03c63aae0f12289254dd9f224f9da 0x2dc497263903c0f5d565659409780e8ee0095d16 0x7d78fc70b98ac8954127a1dd3093403c2d19c491
