ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-DFEC5E93DB1D
|
Infrastructure Scan
ADDRESS: 0x1ae01b345d80aa1b868eaf5cee37608a941810c4
DEPLOYED: 2026-05-11 21:55:47
LAST_TX: 2026-05-11 22:21:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Latency: 39ms. Protocol: JSON-RPC 2.0. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Checking ‘immutable’ variables and constants… [MEM] Simulation buffer: 1024 KB allocated. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Bytecode segment 0xc2 analysed. [VALID] Data integrity: SHA256 verified. [DONE] Log signature: e0084d550dab8e0587b4262405e632135edd3ba0b2af11d2594c7b2bedc23cd1.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x11094dbe13073b59eae9490ce35d81c639154dc6 0x6102e7edd5d7b853c1941aa3d28d74268a3a642a 0x32783353c4e05502bf9009b65b0026338e68d275 0xb79cc5645056762890f47b477f34690b93d57416 0xceddf5b345fcaef3bf424a3aa67dddf05bd52295 0x517b83c26dc5fab852e4a22ac78100915b138614 0x54b9944f4e2a9350714341e5d94f5804f0c16738 0xab2496a8853f6294130b7a6ed8ea11bb9b7f52f4 0xdddbb347a1f60ffbde32e9cf6f53c17e5e304e37 0x9e1e561a8f2aff4e793c175134363d27cfa795c2 0x0b9d4af9e4be04c6b9d665449991838800e42cd4 0xdc614c55aa6dbe6d08c2ca191c7a8cb6e552696c 0x96aee2617799fcf71bb91f31c1a7c6079780341c 0x90a7a6f362a61b4e5876561587ba50de3dae46ce 0x34fa725f8e1a16008b704fd45478c1a5a38f9fd7 0xc5083a723a39535e7c65c2ff396daf2e3c575140 0xaea36f53edded69ad49fc590ac2dc0fff835f1b5 0x5f5a44faf6d1d80f902cd1df7ae428c8b27d41f3 0xf7c0602d49105327e71573387cb28e8743bcbdd7 0x160fea7d43ce7781fc6bc67b0747609cea3df0e7
