ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-B59D7A1A53C3
|
Infrastructure Scan
ADDRESS: 0x29af1dd51c7f8df1720121c3445073bda93460b5
DEPLOYED: 2026-04-24 06:22:23
LAST_TX: 2026-04-24 07:22:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Mapping peer nodes for transaction trace… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Running static analysis on JUMP instructions… [MEM] Tracking pointer 0x73ae1c00 in memory heap. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Call sequence: 86f1 -> b966 -> ec9a. [VALID] Signature verification: 0xe44f02eafc035061cd6cab64f01c3d9459bfcdc562f1fb9aa72ee4326766c136. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x43751c72ae18ba55d713927fe028caf468d54322 0x025d31deccc020b1194388842c01efb16dfaa688 0x495002874652dd13607ec4f1baf4c332faee4f7f 0xce99a716b39c92ac2c9a84b712fcac65e5883c19 0x291d090340519a580bb55c795a3c535aba084b92 0x2cc534288917600adc9faa6ee4a82d63e92bed67 0xb6f0b0243fbeda2147ac2d401855241821ae66d4 0xdbbdedba83c93f6aa9b79da59369e4c18e5a6e16 0x93d864ec5c1fde56866de5f9fb1689a2134d879a 0x7650fdd6e7e6990e7558f496362fe499e574c476 0x90177c8d855a6c40a5fa83d5a0f39eff542d0cdc 0xd95a0f878d3a759d385c9cf5217b0dcb51dd27c2 0xe72b94d372ba459436d6fcd91bcb80cc1ab6f902 0xe220b066dc02ada4e0b2ebce92696dfa902b7c60 0xd00c522ec448618bb292afae3adb310185210f5c 0xf64893518633689c97f10d6cf2d9cf49e900e1aa 0x05fdbc0be7dc2552e52126b48445bd629b80f579 0xa08d3400f012bdd2208246e6e355907286d57521 0x071590363749895ef9578e039c76030482c6045d 0x07138d1e6d06419a8d6c43613e245c0701f22e2e

