ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-E87ECC8D5DA1
|
Infrastructure Scan
ADDRESS: 0x9c51a3cb5094b26aa1dcb380f3dc7e1a7c681c2d
DEPLOYED: 2026-04-28 16:11:11
LAST_TX: 2026-05-03 05:13:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Handshake with node 0x767796c0 successful. [FETCH] Successfully retrieved runtime code from blockchain. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Tracking pointer 0x19baff50 in memory heap. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Call sequence: 5e12 -> a1f7 -> 5788. [VALID] Comparing result with Triada-Security-Standard. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x3aa78f26c843dba6a4835b298a9ac2d6a17b3527 0x454168a93bb4b6e16810391109e31c34768ae396 0x35a771c14ecc6fbd1debd0b780442fb9a6fe82e0 0xc14f9309f7d6101b1d4d0478d2527c60d2810230 0xefbe9ffde91ff4eab4f94e26be2dba85d9c01f28 0x8eee4b9efb13447b68f19926e48862d635a426a7 0x9065bc09d705d333a1a619c638891f67365f4b62 0x55f57cac36e53f779ae7d75b09c7b41237ee4a3b 0x78d8cb6fa0ca406fe484cd0cb98a1bc2a0d00de9 0x0f8df6f9177ab7a804971d7bc2386ae5d7223bfd 0x7806cd65e73cbb05b1e51c3e5f1f173770f47df1 0x6a5b72318c91e6917923bf62c7d831be02cfa093 0x8504acf7b5a7ee4693b670b9789f4a6490f403ce 0xc225535c154cc0a0e511c3e68ab1b57b62f793bf 0xc78ab98aca0abbe9d263aad7765a562c30b15496 0x07d60918af301440aa5ea22f9edf474897cb6a19 0x610539129d0e646580520da6a37405f675a2979e 0x971594f155a823bb87cc96d03b6094862a67493c 0x787712ee159449fc6087027585a701d97912731c 0x984db849b012aa843612d3e32c026d9ff066b9ca
