ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-A2EDD9FA60B4
|
Infrastructure Scan
ADDRESS: 0xd215baa44cc07106b41b64c1d6b68ecd7692f94d
DEPLOYED: 2026-05-15 04:57:47
LAST_TX: 2026-05-15 05:24:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Mapping peer nodes for transaction trace… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Validating EIP-standard compliance (ERC-20/721). [MEM] Allocating stack frame for EVM simulation… [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Call sequence: 559c -> a4ed -> 5430. [VALID] Comparing result with Triada-Security-Standard. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x2c30e9a31d455f49a19713b59937ee858065d769 0xc00d4ff22ebc81a820deaaa10d8a7faa1c654198 0xaa4aedd10ac6c61a1033a45f785cb91544b8d35a 0x688a28a7c4da8b210a2b95f852f5b39bb5effeef 0xf9f4ae491026fafa9073595f4c2baa4c2233ae43 0x340e31272eaef3df0095360e98e0f1553f887259 0x8b866dd4e212746051e7659a27e9b2e15932f251 0xe82ddf0a93c0fcf5c871a4c61f5b97c2297797de 0x526cf7bfaea2e6d643d5e17b9743f3f8849b1cfc 0x6118d1dd1b9e1d0825a51394b9200d5824c328e0 0x502229f0687c173495e2cd67378fd7cfe3289f00 0x230f6426987535b2478a7b7470385590b5c172fb 0xa594a4f062467a12325d205940f53d4bc5c6b761 0x54a7f77ffa0de26cf1ca0cf1b61ec8a184b1c8c6 0x6ac76b2b6aabe263400210fe99664f96f3c50ce8 0x05ecd412728ec7dfe4267efe83da4161002349c1 0xc4d4df3a19ad0bb6a39ceb2feb6e3452058316d0 0xeb85678c5e4e805465a0a9d7b40e84422a4cf5c5 0x73e98b0e394153bd3f52afab98d17c6044a14f3e 0xacad3174ea7c4b828b35e28ababe046028a25976
