ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-061F35A2236B
|
Infrastructure Scan
ADDRESS: 0x4c0201aa8444a2ca5b1e11447b899c3b80fda764
DEPLOYED: 2026-05-13 12:11:59
LAST_TX: 2026-05-13 12:51:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Reconstructing ABI from function selectors… [SCAN] Running static analysis on JUMP instructions… [MEM] Initializing storage slot tracker… [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] No critical memory leaks during simulation. [DONE] Log signature: 6a129dca40c1bb82fc444ca23fc9c91f304a50f091c61b4d371039bdd8831cf5.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x49aca0a96b09f24518ad5161ea89a172ed6c19d5 0xe56103380260edec4be60705e58f273a0c667220 0xb9dfc7ccd29ff9a212f058f3702085b2716c80c9 0x93ea2dc2047dbcc862261059f599ed6699278b14 0xeadcd6a65f9e04289737a3cf1b903e0355499b44 0xbbd33b50164f894887a59c3a6831e4b41285f59d 0x17426680ad39f3f06d1c0f8a027a66ef939662fd 0x582ce1d22bba92b22e9bb29404414cb36e87c000 0xfdd9455fd1d786752388cd7acfaf8d26d790b783 0xb3542adb89995b1fd20e6fb7b2c692d8ee549b41 0x86d905657e0f606c9b23cfd7210da04ef6b570b6 0x67673a0bd10acb6129e48f08dacf953c85025d85 0x0087054a4bd0bc909601d5ba4505e45f2d663997 0x5b7c1c4b31e68ee95f6137ed8ee15ca62e6880d2 0x79fab02e03bd6bc502dd39e602b9ee86b046459e 0xcd214c89472fa89bb374c783c3673106787de98c 0x60104a984be2a296df4200d5580ffc0da50f7405 0xae1adccf71ba9045c2a8953189357efe15dd8cd7 0xcb3168e89c375fbd0649067b63d5379232763499 0xd8551c90d1834849a3a0c94aafd2a03b05372eca