ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-82140F8182F9
| Infrastructure Scan ADDRESS: 0xd147dd805a0cfebf6fcfef460e0c4c716320ad47 DEPLOYED: 2026-05-08 22:08:11 LAST_TX: 2026-05-09 11:34:47 | Compliance Status STATUS: OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface VISIBILITY: ELEVATED_PRIVILEGE_RISK |
◈ OWNER_PRIVILEGE_EXPOSURE An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! | > Execution_Trace_Log [SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Synchronizing with block height 1016. [FETCH] Bytecode size: 9384 bytes. [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Snapshotting EVM state before execution… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Debug: 8efba4435df3dc60. [VALID] No critical memory leaks during simulation. [DONE] Triada-Engine standby mode. Load: 8%. |
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xf108586d1fc330ea1d4ea4ff8fd983cde94279b1 0xa62f445a1171fcfbf76eb44a866c7b48f1a6f226 0xbe37266a6104502c703570e89771696393bc55e9 0xc9bc9718cd5d8aa4bbe8fe374ce37107e2faa164 0x5be313094a4d35b1db233d640176b4dd11f79b67 0x5d24e95eb1526d2bc5c43c3648176f5b24583f08 0xd0a34d2278fbca5c30ac0b924957424713395efd 0x882d24301ba9b7d9a8262b99f7a2332001bd3c07 0xcdd6fcd01127af393171ed9628954bc4b0681ec6 0xd9a25872d3c046df94327cd46bcde9e6541d6bb1 0x71151ce46d1b2390438db4a0f9e4604b2092cf62 0x1312562625b52e023b6ff2b0d233666a6b31038f 0x7c8733ea56a3302fa00d687adf0bb44d9c666c6a 0x8f47924b0cf8232198ba8545128893c1e2135888 0x7bac254db9d168eab1e413d84f69a9978da48248 0xed811aa7a20bcb592c2f29dacd2d8ea0f42a68b2 0x2926cb71c0641ca6f1072eb425d62c450fbd1dcc 0x28798f858021ace12b37d42f38f3becb5d1d04a6 0xda675da104e1e5b1228cedd681c7379102646dfd 0x30499e637829d10b6e96cb72fb42b497d72e6fa8