ACCESS VIOLATION: Audit Summary 0x275a2ece2388333d54dcff356d0cb4b21940c2c3: Accessible Debugging Interface
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-EA3C4BDF470A
|
Infrastructure Scan
ADDRESS: 0x275a2ece2388333d54dcff356d0cb4b21940c2c3
DEPLOYED: 2026-05-13 16:22:47
LAST_TX: 2026-05-13 18:32:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Requesting storage slots for offset 0x00… [FETCH] Entry point found at offset 0xdad2. [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Stack depth: 5 / 1024. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Return data: 0x13f78c1d… [VALID] Gas optimization score: 49/100. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x66ca129b7bf963ffb424ee8af1e1c777d4a76753 0xe4028641721268acbb2eb36865c91b39ea9f7ce9 0x6e39c0297f63b4e864f2b0680c3c87d73928f2c8 0x8d66efcf1511aabfa861eb9cb863ef5c1f56236b 0xe61370b0d721871c87332b5a55424ff54260ed4e 0x4fd943520b508f5f3691b650e1a68c0e754a2e39 0x8606fecc6339f6553c0a1dc2bdc1f3ffc83d1ea6 0x4a26adf132599fea293dbadb54b72ad3bcc59364 0xe4cd1df283f21eb9e69c165c1aae6f5f79079668 0xcaad3f857b06e839bba59a3270ad2d27bd2167df 0xb7942c70c67cec34c6a5b180ae6fca9736ac0327 0x83e035c411b23587e00f1a38007a7b2667fc3a86 0xbe82676b7cd4d1db2a469a03085976298e086779 0xa9034ef591acfab9b92aa7ac8ed3286eddf489ea 0x45644fa158d565e62750ec7b81dadf4265a5f38a 0xe11b10dd33dfd3caaad0846b8517629d1c8f2f16 0x72986e31451e433f9a9a4bbedb3b2f67de86054a 0x9302cf543f11f2407b8e6dc6dbf93c9b153f5658 0x48a3743c8b3e7d565206014d202580563e347806 0x0d8449c85a8880b7cbe1465f68df9fe0ab5f3dbf