ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-891C578BB929
|
Infrastructure Scan
ADDRESS: 0xc9eddc0ec080cd83fe1e28071826006f53d8d1bc
DEPLOYED: 2026-05-13 06:43:59
LAST_TX: 2026-05-13 07:43:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Identifying function signatures (0x09ba1e14). [MEM] Tracking pointer 0x31fa96d5 in memory heap. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Generating cryptographic proof of scan… [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xdba98a7492d3009409b57949defa310bd74cd40a 0xe7cf6a7fe834ad68ee5d0c82a50b717bef63ee73 0xa5b4ac06eccb94bad9c4ed573b4262598ce2c09d 0x32b9ce4b8ceeb396a419c78d2e89e74a1249a1af 0x90899a6b71f6379a0468683739edc8e730fae754 0xe3d5daa0543a396bf14d8404cb9e5ad19d7ec819 0x6e810d5c33a4355ce1b4107f5722787bfd7acf24 0x1d6bac431bf4278fb6b26036dc5cff8cf01af6b8 0x4d2d9ca701e9c7717e839cbc1b9046f8f2a294ca 0x7ebf6b9bcc2fbbe90cc5fd98f95336898112042b 0x5e1b40150612dd921fee439897a181d8bdffd37d 0x5460f879b71831160bdab6195df324d972f1fd8c 0x2d36e1c82793d3381f620602b23297012d3ec41e 0x6f34405266a5f8d62f2a3707595522b06cdf0085 0x388c6506fce2b3596820479b92844c1b76252c9b 0x2f08a0f297725d80b29a69ae89109d622ba2f7ba 0x272adcd7d37bebbf740d8e35c0d751a6ed4c7983 0xa5c5b4762bc642ba46da07dd1659c654f7787b08 0xd6838f20602a1dee85b460a7155e39bae010872e 0x2142739fab084a1d5336ff483b881d69c4c9615c