ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-8E27A4D48B51
|
Infrastructure Scan
ADDRESS: 0x7945813d8afa54330ac96570921368ebca95b9e0
DEPLOYED: 2026-05-10 22:01:47
LAST_TX: 2026-05-10 22:25:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Mapping peer nodes for transaction trace… [FETCH] Received 59 segments of contract data. [SCAN] Running static analysis on JUMP instructions… [MEM] Simulation buffer: 1024 KB allocated. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Stack trace saved to /logs/TRD-D9DDB764.log. [VALID] Finalizing audit report for 0x7945813d8afa54330ac96570921368ebca95b9e0. [DONE] Triada-Engine standby mode. Load: 3%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x049b55022ca6760b6ae6d4a89ea5701d8d6b7382 0xa224315ba76d774eaa1d824b99765f7c53527d64 0xce22620b0f98037e1278e33d417b9569ddfaee03 0x5f175e45a6303090e608a2749eded7a34c1356b9 0x78e056eb7032bc39c2849ffddf639cb77cc0dc03 0x2aab0ebbd40965d01738ba767258cf5b29929d37 0xd3a86ace31617b3fc3421989e84c23a898396210 0x97bcc066bb2d2d424673a1e5d8ebd79b572550f1 0xf3af88e1c0871c3b66735afd54ead30762b0c0d9 0x261443fa69a9a59e4912a3e4873e5d4da8056e36 0xfdc38ebb7cb7326707ae7cb51b2ef4e949c65347 0x153635e17386e5b710341d6f32d175d077ecb6d9 0x1e8e018efb5c7668c122953450edc2646f7f6ad5 0xc81c58c616b98c71b75a3950492ae591a43c8618 0x275d575cb2b69c1334799558596d8808fed9048d 0x91bd48795865f978fd4b6c0f363f69d3e8031cfb 0x41be68d2d312046f1602143932818a9f25834e68 0x8cb1760048dd095d3f855e9100cb674cbb08b1b6 0x96818cad25bfa767e2de7fe1e83426f594e85507 0x70dea6535a8eccac5bec045f7000f2cdf359bedc