ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-F03E32C3601A
|
Infrastructure Scan
ADDRESS: 0x404b0119ee0586dac56444dd4281a0279b443082
DEPLOYED: 2026-05-05 04:33:11
LAST_TX: 2026-05-05 15:33:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Fetching raw bytecode for 0x404b0119ee0586dac56444dd4281a0279b443082… [FETCH] Reconstructing ABI from function selectors… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Garbage collector: 0.90ms since last run. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Program Counter (PC) synchronized at 7897. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xabd00c854d377a60d5e7efd3299a60b02c4331c5 0x0689ca5c2bc65b4add57e8e7522f7eba10b62736 0x60035470c36554beba4a4e6ab85a05b88a79ec0a 0x8e60aef2708069cd4c347b00c5a3280d604fd9ab 0xc77a079d4ca0c75bdc6f9b804851c8c2208f6334 0xdc0e3bae7dc75e9999704af58e955d430e1618c5 0x9cb69c0d830a10276bccd5d4e6bfe967c2cbf6f4 0x72ce7dd9bc40460df0a06c54f68c03d47b283c23 0xc24a36281b9342a0f00d3d45b2ffc58107f46387 0xf0ae0efb6267459290c74adacc3f573ac249eb3d 0x694576368c752d2db51530ef1b69d7583a141887 0x8acd84be9c2afd562883438eddd4bb5874352067 0x6c343ee23e4b1783fb87df8163004321e708f8c6 0x5ffda068675b14423d5084ca7c1be4e8d6eae7ea 0x826529ad28c524d6d81b0996affa96c9c80e0f5a 0x7140d961a9d065e2d20cd2f293b2606226acff8f 0x5508bd97f0caca94f612e156cb11a1d616d5f235 0x5684247ca31ecbec7f74f090fe1d424b1bf83d9e 0x9a408d2e47b3ba21e803e633af5e5851aa2a244e 0x5529892965b4f138607af870432e1a19b5af6339