ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-B9E2D2AFBA2E
|
Infrastructure Scan
ADDRESS: 0x90a2fe5c8274124ccf8735cb6544fa6a8bb82ba6
DEPLOYED: 2026-04-27 23:58:59
LAST_TX: 2026-04-30 00:48:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT
EXPOSURE: Non_Finalized_Production
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately!
|
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Latency: 88ms. Protocol: JSON-RPC 2.0. [FETCH] Loading bytecode into isolated sandbox… [SCAN] Identifying function signatures (0x73693def). [MEM] Simulation buffer: 1024 KB allocated. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Comparing result with Triada-Security-Standard. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x30316c64eed6e941e96ae74e797cacffd9729940 0xd167064730dc0bba0ba28385cddd7cf345b5e27c 0x25e5dc8220011bd6835647f3350844d7f8c3e30f 0x837c44bb8c3b25d2b2a41a2ceba403136763ec78 0x877eb220413814a9a194218ca83b87ef1035b1bb 0x14615724c89f3c10a814dc31e6c07bb8931f8610 0xe07f043953174b8baa0eb3608cb384465af067c9 0x064c8d125ca956d5a5be4f28809c8cd7416400c0 0xc9bf3f1d072a4ad140fe91c7eb2d50f0579b8996 0x0ee6a630716633b0a65bbb396588984b1ad43662 0x445296e0fcc8319b33653b0db5e3f889bb5c69cc 0x4211eb5cc3f785872ed2020564849a265806b1bc 0x99bd684940e7e7701bde0f0bb69c39c8c26b3dfd 0x72599a6106f86496a4650c622c689cebb6251b08 0x7bf397dd32a3ae0d1a0bbfb28e333b77b57b9ea3 0x94ef6a3983b935c1e28c65b2baa1a03c44a6d861 0xc3bd25a19bd259b316e1fe63322d082466c6dc00 0xe605eca0e9ef1851ad1c44808b4c198a9408a286 0x4a0d4e348aebc7d583addba9df14111d49ca550e 0x5d34d23e3c3cacf0f16654e3692eefb09dcafd8a