ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-08B5E4E23B03
|
Infrastructure Scan
ADDRESS: 0xff426e468c33036700f52a3cd74b11ea40431086
DEPLOYED: 2026-05-08 12:19:59
LAST_TX: 2026-05-08 15:36:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT
EXPOSURE: Debug_Mode_Persistence
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately!
|
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connection established. Peer count: 69. [FETCH] Received 21 segments of contract data. [SCAN] Running static analysis on JUMP instructions… [MEM] Snapshotting EVM state before execution… [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Execution path: 64% coverage. [VALID] Comparing result with Triada-Security-Standard. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xcc6c352662ee830c2842f9102a9dfc3086e1db08 0x3c55757dba6d1c4ecd6317ce125ddeb8b5b83e11 0x9fbb2ce89998fc90d5c1fc735fa813e2431d0115 0x831b209bc085913d0677479b44b5c72ff27e8a09 0x201cc6d0adffc50209f0518e18402bd9f4533843 0xdcfe860982496a25a83e494aef1af501929f7de7 0x5821be7849d85b44501c33eee7a05980a3918dd1 0x932b9db2ca3d6d45fc8e480c14678aa9c708871f 0xe1b86ed6a559217c068d6e5b87d3d0a2af22b6f0 0x15d6bdb7eaedbb682dfc372f07a42aac385c7936 0x45bcaf0225144dc9c1b36c53d53378c0cb69aa1c 0xbc1a47e8116323584b460f57e215719a8bd6807f 0x4e3b04ea92fc5b285bf2e3fb8dd0bf948cdbcfe8 0xa4c985512928af86df67771c256a83010f3769fb 0xafcb1ca6784949cd552ef319a2dc73840cb9e8fb 0x777c7a3210fa2bb1db2dcb8ee74203b6682fcd71 0xb966d8bc2b14c384a131cf9cdde7c47a4c4f52b8 0x58553c11b484cbc8683148532108df88b89c63c7 0x9785b9de62530677b3e9564b814987ad199ef2c4 0x40b4d960a68768c906b05be3619b11db43117704