ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-9E61D6651DC9
|
Infrastructure Scan
ADDRESS: 0x275a2ece2388333d54dcff356d0cb4b21940c2c3
DEPLOYED: 2026-05-13 16:22:47
LAST_TX: 2026-05-13 17:02:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Handshake with node 0xc99dbb7a successful. [FETCH] Successfully retrieved runtime code from blockchain. [SCAN] Running static analysis on JUMP instructions… [MEM] Stack depth: 5 / 1024. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Execution path: 82% coverage. [VALID] No critical memory leaks during simulation. [DONE] Scan task 6252319A finished in 74s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xb6120eaefbdc0e8adf17b59407c0dcda6fe2b2a5 0xa45d3bd1880ba65cabb165f1a46f844a07982d6e 0xf67712405c47660d21333b52d6e8b1cbe6b7e547 0xcc1c83b9157cd3acebfe9b39cd94ad0f755cc921 0xb30d5b29793049957724aca1e7c3b56886d71841 0x477f9e6c5c20af30285474a36df39812d3cf3721 0x4d2963ee845126a8a683e3d682055cd5faf5fc82 0xe2e3f74d2a3f8e13736e941d93bb754e932181c6 0xcbced16e4aa54e8ccaeac819cafb8794e8c26394 0xa7dea91bd30a4f724da257bb5329292d8fa43877 0x239539093ac8f231e9d82c3e9cdc0b77d17f4a9c 0xce3d4fcc5256f6a6f2f8321a05cfb2ce35fd38dd 0xb1ca6bd91abbaaa536eac9f10bfcf142f7dd1180 0x2fd10d601d47cfa61a8a8ccadeb9b92203c78e4e 0x2778119b052e20c6d0401313616ca9050ba12253 0x7b786982caef69f8d501c0e1d83d1059ea5beac5 0xe7baa0e5b6de40a2913cd8f5d83219d01e4695ba 0xf634c1bc618c89f9f0d469be69deefe14a0a021e 0x90b8708a467fb989b3613d5da526e0d425b4c166 0x2859f82f9a02395bf2bc1c389c153b6118b5b868