ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-D94FE2E3E62B
|
Infrastructure Scan
ADDRESS: 0x088819f032f132cf6bccaf8317ffd5f4b9e6dd09
DEPLOYED: 2026-05-05 14:10:59
LAST_TX: 2026-05-05 14:48:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Fetching raw bytecode for 0x088819f032f132cf6bccaf8317ffd5f4b9e6dd09… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Stack depth: 8 / 1024. [VULN] Potential ‘Dos with Gas Limit’ in loops found. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Return data: 0x36e3ea2b… [VALID] No critical memory leaks during simulation. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x12ae2fbd9a2cfc797c0a0d002b1bbc5c7c930fbe 0xe87e10e4acb7aa5e8534c91d2471baccd805930f 0x2e498db32417ca27fd13e54a7ff3025bd6db52b9 0x17a438946653a6b22cb94866f9fadfa5cd585486 0x2840a84bb26fdecbb4767c526cc53df21cb7cd02 0x5066497f42d7e46114f3ead606ae322dd61601b0 0x9de9620c690b80abe7f110735fa3af9c6c887eef 0xa67e0281df972cf121362ddf5bcc135fc33759ad 0x17fb6aee5836de3d005b050507fec965e62871b0 0xd7388494e1980fd11e2c6234f2f63f3ab275752f 0xf7b4e7aef4526c8ae335cc2bae26ff5dc3516c6f 0x9bea757034fb1188f118586ab05b225ccd218126 0x1eb8d7808193ab216784028602ecaab25ce7397e 0x5954b84f00f1193c1dc1e48d170870aee56492d7 0x824fb2e495e8ca88cb4437b1b7465e576c9cb5ea 0xcb72c83c4ca3dcb267ab958d77598137167aa3b9 0x8be8a8d3b17f22cef85c28869fc3fa4590d55bac 0xc632e33f5f73e78397753a78504e75cbd5972b95 0xd4782670e53af442151dc529a1d2e2e7149091f5 0xdc34458ed74b578f60fe994770cf9693eee5a530