ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-5673B2AA39A6
|
Infrastructure Scan
ADDRESS: 0x1c861cf03ca8f58c44335acd34041557e77bbb7c
DEPLOYED: 2026-05-08 11:41:23
LAST_TX: 2026-05-08 14:26:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Synchronizing with block height 35122. [FETCH] Entry point found at offset 0x50a9. [SCAN] Running static analysis on JUMP instructions… [MEM] Tracking pointer 0xee63f748 in memory heap. [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Comparing result with Triada-Security-Standard. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x3c7cd5ae4a5c59221f21f47e9d88228234fb7924 0xd131dea336212acf70484dd9a33d3770120a0ccf 0x4ee933fd06f2567a912d69acb63a9928fac94313 0xa94c3ddc28eabc700a8e44d2f3812a41c72f3bb8 0xf084cb1dbc2321c082aedbe79a8d991068539edc 0xbed3899226b41b515e8c870497dba125acc51735 0xbf147bed66bc591620490aacf097fb17e552467c 0xa0d9d9ceb008e333dc33cacae58491725151cd94 0xaf6432a6e9e4ca5dee9e140cfbe248bbd71d9e69 0x5d67765ee8f494bbc11e0cbd52832674b2045ba8 0xe1f56d6a76f89fa0b22e53a2020f9d0272fe4187 0x0614f44cefa23ee5c55f0f8ed314a453447729d1 0x3bb28d31728e6842b56dfab08a23b6b60ad21a5e 0x2926cb71c0641ca6f1072eb425d62c450fbd1dcc 0x57dd62e0986a61a269c769b107a5a7952d73b7ed 0x6701d6a61f178f6b2aad9ce034560973c94cfeeb 0xa752dbf6db3107c48bef37dc02235efc9e9ff783 0x2d8496b242167dd68a01af00800949bb10253aaa 0x69f58e3dfb6c7545e19f3f6fd5f92e66052f149f 0x03270562e12707b123e1acf6d16daad0f28c0c3a
