ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-BFE48DA0C0CE
|
Infrastructure Scan
ADDRESS: 0xd3e82845840218e4752401edd45b67a5ce977542
DEPLOYED: 2026-05-14 05:52:59
LAST_TX: 2026-05-14 06:52:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 61113CC5. [NET] Handshake with node 0xaa3d48f6 successful. [FETCH] Bytecode size: 1938 bytes. [SCAN] Detecting compiler version: v0.8.26. [MEM] Virtual memory mapped: 0x0000 -> 0x568a. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Call sequence: 55aa -> af42 -> 334a. [VALID] No critical memory leaks during simulation. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xeea57dac37b285c475c64cf1fdf3b78679d63e16 0x4bc5d35d9bd31209b9a5bf13bc260f5fa77f0dbc 0xc2f09127ca865991b3970129171c0283f312567f 0x847ad8fea8f61ad10ad2f9abbbf1b40855562e85 0xce69d1762b4d8ac27811199ba3afa02b6db9e9f5 0xe9a59e22f219148b3e4da6cfbd0ae65b93c7d5f8 0x710aae0eb1b980a1d6ddce97f0790e875bb8ea07 0xa991670fd2ede563016490261227c7cd49fb10ae 0x9923b5529be62d49dcf2fb59abcb508d18ae621b 0x02cf97a24f77e5579594c0ca0968a2c09877b334 0xc934cd54273968b8d178671985e685b965d99210 0xd132498196f64754ce362842c61be76bc95907ec 0x77b16fdb2360215bdfa8246ee3694d3b7f95d1b0 0x4a6d1f3e9f47b3ef4a355bc5da6c61a3a49ec8d8 0xfa63f3b173151b04eed42aea505e559fe670f0c5 0xa2647714604fafed3bfae3543c0d8cfd8fd53a4a 0xee2292985d73ac30ba16ea5f4bb23948e42839d9 0x8cf877f0ea31be8131a6ba5cf95ad505e6d059d9 0xe826015697c5ce9860437cf3941065dbff6fd0ce 0x877a64e458bfb718b5ee1e1c27aa7fa00c068a10