ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-6F552E77D2CB
Infrastructure Scan ADDRESS: 0xfd7db13b002f927891ab20ebbca890c1b5a459fd DEPLOYED: 2026-05-05 08:50:47 LAST_TX: 2026-05-10 01:46:35 | Compliance Status
STATUS: OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags VISIBILITY: OWNER_PRIVILEGE_EXPOSURE |
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Handshake with node 0xd1619559 successful. [FETCH] Entry point found at offset 0xa99b. [SCAN] Analyzing visibility: 2 public, 1 private methods. [MEM] Garbage collector: 0.51ms since last run. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Bytecode segment 0xf2 analysed. [VALID] Comparing result with Triada-Security-Standard. [DONE] Disconnecting from Ethereum node… |
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x7acbbab7df6c80e3884a3d8ac05ec73df0c2915b 0x5506adbcae39cb64a65cd93e64122e82535b8540 0x5a717462a995632bb6745e1c9ef11903c8f898db 0x9482c48c70c170b2815d571c16c9886c07c8515d 0x4d6390d9d7403452a5ba190f8734c0f8cfa2f760 0x69a7a2dfbbc7c2bc4cdcb5bb94e794357b4b2d2a 0x2fe2644b15ea065a191ffbc0ae3e86c19d60a9bb 0x68c856f706945fd09de33d057cdcfa2ca39f75ca 0x87430a250fdcb294572fa4e384c940842a3b1277 0x1107c8b254ca8934e22b8093a948e5472179d43a 0x8b932678aec79468a57bc5be098b908b4a0f2ca3 0x1b062ccd183f347bf297c3526a89dddbe2c8fa64 0x8e0913ffad3064a1e29d1ddbea01d55af48f23a1 0x13b7af22617d36fd72837a6de64a2f6a352b22f5 0x3293f5100d329260014c8616c9a1cfbaa78460f6 0x5d29ac979e6c344a4a03d66a19a93d39adeea6c6 0xfe5d85736e88f65725e743c664d826c26b131cb6 0x6b9e8728c8bf4b0fc911d1baced795c6c07c090f 0xca289bd0989915bb54c78be296943f6e42efdd08 0xfffb7d7fc09ce314b4002cd5026cd04240ae5281