ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-116CB169B408
|
Infrastructure Scan
ADDRESS: 0xa0aaee1b351d6c497154cfd9e433107a73f9e758
DEPLOYED: 2026-05-13 09:45:47
LAST_TX: 2026-05-13 10:14:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Bytecode size: 5250 bytes. [SCAN] Mapping internal logic flow and branching. [MEM] Virtual memory mapped: 0x0000 -> 0xb283. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Debug: 7bf791f3dcb4b597. [VALID] Comparing result with Triada-Security-Standard. [DONE] Report exported to IPFS: 81df57c2…b2ff9c86.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xfeaf3dcaccabb91a7a72fc8c42973fb67582dd7a 0x21c7480b72c47fe93102be5b865d18b770338098 0xb7663250cfff1b40db6c74aca0125a1b4d29c769 0xb4ba4ad2751d376608e5a439d552d1b3b8dbf60d 0xaa5d403398426432dd48052facba518f41607695 0x968cc848071e0e18e053a0dec5fde4929cb67e63 0xa0aaee1b351d6c497154cfd9e433107a73f9e758 0x9da00913ef4211bb87cfea625fd0f0649706bd3b 0x8a3ad233e3776ef7935109cd94abd62d9b49fc97 0x8d17fc21feb6d57a52ef82eaeb6eeff38e968928 0x746345b4ab26fd9388b8d984254d012aa1dfdc65 0xa5389a35cab457424393648acbb195b9af5ccde7 0x57098ce3e2780b539242e4d2b102546119048baf 0x8ccdb088d2e143c06c2ba205c4b57b83c65ff939 0x862375e8ea5a583acf6647c007cc81e8c68eb664 0x257a418f2f29ff37253aa35aed7ceea68d9b679d 0xe0ba52bf094e709916519cd8ce6575d341236e9e 0xe4804be524a0df09686fad72fe7a9e462854bdd2 0xd7bb90d096562733a5272396de8fec02e19a7cf4 0x4bc5d35d9bd31209b9a5bf13bc260f5fa77f0dbc