ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-13ED08D7E98E
|
Infrastructure Scan
ADDRESS: 0xfec77a3c34c4a11a87bcdb6813343d105b33f262
DEPLOYED: 2026-05-03 01:09:59
LAST_TX: 2026-05-09 04:19:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Handshake with node 0x6136a01e successful. [FETCH] Hex dump completed. Entropy: 5.47 bit/byte. [SCAN] Mapping ownership-protected functions… [MEM] Tracking pointer 0x72686106 in memory heap. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Bytecode segment 0xa9 analysed. [VALID] Comparing result with Triada-Security-Standard. [DONE] Log signature: 8f4f1669b0c55e0a5ea2d9ed22b2e9a3ca7db952afc90f1826ff9acf23182314.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x3fdc9c0f0b8ae432b675ba3546c6252086835894 0x0d55abc8fa6bd66757ae210bfc26f14d52700a3c 0xbb5d2f107a20b2b5d7558d38bbe31c7870c357ee 0x5795198fe1228273505b7c5758f4b9434d224d6c 0x90b73331ef3055700380f944fe26456b56b4edcf 0xff94d15661e2ea14e5c3b87d573e506832a58cb4 0xe752a92c3acec197f7701b951bfb92c40454819d 0x5d0730b23daf219286d647e4c00403a5c6556118 0xa6ab243a71bc7f4cc9ce19cc9655d52ce0a04254 0x78f1d4b08d0b1a8c6c4717e8ab5305fe4e9107e6 0xa643ab67cd2150e9cd66dc706be970f45ee2e6d6 0x0977592f86616788fd809446e094f9bb91e97a44 0x915c6f96fb1c6e13c65e345d7deec215ff9c8848 0xb517cfb7ae7d829845d4dbc06cd9caf9fe8e8136 0xdda2c089e274378a10386f4862ea6920f0f33db4 0x9018f1adc953594f3fecfa1df6c55b9a01a75741 0x3e253248d966b652b85d72aa35903ff7f4b5b987 0x94dcb04bb7c7bb14393e345e3d748e4c2d6b6a3c 0xb5953ea1aa7ee494e6b9802891da711965a2036f 0x3293f5100d329260014c8616c9a1cfbaa78460f6