ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-263F51AC0B4D
|
Infrastructure Scan
ADDRESS: 0xdb2813a36951a2404eb5900f6c3935902aa89f02
DEPLOYED: 2026-04-29 01:35:35
LAST_TX: 2026-04-29 03:22:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Latency: 52ms. Protocol: JSON-RPC 2.0. [FETCH] Entry point found at offset 0xb5ce. [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Allocating stack frame for EVM simulation… [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Bytecode segment 0x2c analysed. [VALID] Signature verification: 0x5fa8c1593c69308734b12dda1f1363952bd0176ae78d209a2baa80edeec562e7. [DONE] Triada-Engine standby mode. Load: 3%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x4a4a334cd76786939d310a10ec8027589a0503f3 0x7b0db2d34a4c801d641b47822c12ad862e512c64 0xaf07b6b44d7b14595e5aeb3d9e5a95587363ac52 0x7db4246f45a7ffe4a468ef669e905ff06f3128ea 0x7071cfde6647a4c75d4be6f249a5855cd93c00a6 0x3358d8449231e4ca75e1c39d9445fb90aa77ad21 0xb97dee102c26bfe2fcda43332e721ac5807d0fed 0x577afd0ec73700b6f4b2f1a062622e740e582752 0xdacb22af9ee55d3d171c201b69a70ad8c8152d7c 0x3d1083746a9d97778566567b1511ab076b0bf5f6 0x6f5683fbaf75fb42e656c65cf7aaf80f9079f8af 0x5105f259a27751f55c6e2b65e330e4dee668ba91 0x38322d88535a6bea1565c41acdaeabe2de7b323b 0xf8d5d62bf9417240a58149995c39238289c432a0 0xa81098dc3eb7a45345f3af664fdd7600fcee8f8e 0xce82d8e5ca57297510599de72e5bb592b40cff08 0x9acc5d95c946cc9006aa2dd5fdec2515fdc8c535 0xc21a411071489bf2c2be00215f87ae4755018c6c 0x16f409ca00730231531f0bb955b57a7b7e91acaa 0xf4183fd67de8a556b9c4a7e86f080ec70b5d68fe
