ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-B910980DAE04
|
Infrastructure Scan
ADDRESS: 0x654c663f2d4992ddd94da6f399c461304fb18755
DEPLOYED: 2026-05-11 14:24:11
LAST_TX: 2026-05-11 15:57:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Mapping peer nodes for transaction trace… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Tracking pointer 0xf2d4df69 in memory heap. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Bytecode segment 0x28 analysed. [VALID] Finalizing audit report for 0x654c663f2d4992ddd94da6f399c461304fb18755. [DONE] Log signature: 558f15bf32babf9a5ae7385e889012b62c977d7052f96c2d7b5738538b9dd66a.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x468065344d5e42a9df4950ecdfb254f4185f99ea 0x26ad31092dda77ffabc49fa45cc6fc58608a2511 0x8b07f1a5a1b47ef1ba44565d9237edbb25c6c2a5 0x6d99676d000e8c9814fd98cf46753844da8588c2 0xc7c0bee41b7e5559d8e04c3c409ad896bcf45b2d 0xaf02e3e6a774dd59e95657e0fa441ab1915ebcbf 0xb4d1e5fc54ed2ee58fd4be3c39488ac4d4a9dfb6 0xa41780044545904f40dc66283dacd91b7da7c0f2 0x547c39149ae48e2b3a5c5ffc040a703f871841f6 0x056a20dfe39f644b19c2872b75efcf97c2d547d7 0x549502027f2ef6a973b8ed30fcd023275c057100 0x7098d10c346b345dd455928957cd6cb62f640c4b 0x19f1595c37a4540998c38611c28e8c91609ea6d7 0x0ba68ef5dc8ea2f32e694ee37bb5c6756305e1e5 0x9914f33bb9ae5de018c0c2ca5d5f5047b3fc5210 0xd549198e9ab33a411e80ac739c48be4183bff387 0x0bd0741b0a6f88c38d6042cf3d846ac5ff036707 0xca47842e4cf9e345a653166a30a46dffce4d473a 0xfe24da66e247d5d8266bf92f67f2c47ad93ccc48 0x8a6893c06b32cabf578b436fbc23e9b5c965b468
