ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-C3C9D92913A6
|
Infrastructure Scan
ADDRESS: 0x554ad8f777a18811662acdb96558746694fc0267
DEPLOYED: 2026-05-12 03:42:35
LAST_TX: 2026-05-12 04:40:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
? OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Mapping peer nodes for transaction trace… [FETCH] Bytecode size: 6079 bytes. [SCAN] Checking ‘immutable’ variables and constants… [MEM] Virtual memory mapped: 0x0000 -> 0x5ffa. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Execution path: 73% coverage. [VALID] Comparing result with Triada-Security-Standard. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x26541ef5714bee78ed15c2f788ce40418b08f1e4 0xcd6f22fcd0e02bcac83455c8ba8ebd1ae4581935 0xcbfd667a086e2c827e7ead827a60b71c3d530087 0x6c044edeffadc3a4c2ddbd19eb730b09efeb2fd1 0xe2f37dd383901152ec8b44c4170f0f16d81f6225 0x38e9b2c61f15048f798eed4f689aad615eedd8f7 0x1c213c002e712834bfb477e1e9f4dc709dc8468d 0x38140673567957dc7946abce45c271cac33fa2f0 0x3ec709cd28a3c9bfb2071e1923eb1e2e3e5c618f 0xaa4966eb805130e4b322d30a66f234da8f16be71 0x42a5c6aad312658123f7fd6046709e4e9a4e54f7 0xc8d60ad67b014aee241c8625a85f9a7ea5fb09e6 0x2b9aaa03a44c535153a2bd13b00fd260ae12c221 0x25a6f29ac6827411283ae767502faa9435516b11 0x2d5102e68e1bf377964812f7276f5a93875af3bb 0x69de3ddaf94bf0457aacfd0a2f9f8b0cb60af3ce 0xde1b60af8f08e70f97800234845ecf8089ca1f4d 0xfe9714d5f31bee635ae508a5c4ebfcba11dd561c 0x73af1e8d7a7093fdfed85141c540090740daf1b4 0x746cb31b458877f8669ebb47fb701644fa6509b2
