ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-E0EF22ED5869
|
Infrastructure Scan
ADDRESS: 0x22354812c9202dd45c6f0939946f52bcf8f90851
DEPLOYED: 2026-05-02 09:51:35
LAST_TX: 2026-05-02 10:32:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Checking ‘immutable’ variables and constants… [MEM] Tracking pointer 0xd102e17d in memory heap. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Security status: DEEP_CORE scan finished. [DONE] Scan task C90DF457 finished in 21s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xa3acd64dfc5fa7e3eff39a60948ba3385f704be3 0xe26188b8c187f251e53ecc95cdd887e00e22ea2d 0x41060cc50a3f1e7a6a6c5a39b5566390e87d02ff 0xf05de9d8d25e9b693a6bd126c23380510fbf11a7 0x13c7c4d81d2123e2525f44da325b144d7b21dd8f 0x09de2e4d02050a345616a5802d9379e76442338d 0x2010895d4c0cb73e4e320a913c805db27da4a57e 0x206cf77daf28a437fbf31aa16d58ecd864f28fd4 0x1f2fd80c45911c52e92da95f2bc68bb6a94aaa2a 0x4f6abe239419587600de5292f09ffb1e28010ece 0x3ac54de8abb2a717c32eb0e8695144f5590302d9 0x0c556809da00fa524c01b4b44a302818ce811bc4 0x5c0e2680246fe6e60db38c42c1439d33dabe9b2b 0x5f593eae6c9f4b7ed5318e89fdcda78b95675811 0xcc753cd358ab8dece74ab1780593676a76c6008d 0xa69bf86b785ccaca715657f741bd57383683fe65 0xcf5971dd67fab8ecee889d412847fc9988bac31d 0x74698372492e19e388de782a3e56f0f532732cf3 0x468b43f4b5a487e2b49458db72a2ad5ee7d8ca33 0xc4e4e75fde67ca84b97d20bef43b37d4d356d16d
