ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-C8950C49A7DC
|
Infrastructure Scan
ADDRESS: 0x36fae25d23f8068c0b5248826d78980b29181683
DEPLOYED: 2026-05-07 14:03:23
LAST_TX: 2026-05-10 12:26:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Connection established. Peer count: 67. [FETCH] Received 71 segments of contract data. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Allocating stack frame for EVM simulation… [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Bytecode segment 0x36 analysed. [VALID] Comparing result with Triada-Security-Standard. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xf223c4fef6c5d2bb8818051a82853e678478bf66 0x5f6869f48b3cec1345eda8fd7c06a996d7d01914 0x1a156596f60c4d341ebf138e5462d3f3e4660db3 0x80f48a6c56c1ecce75b4be7cad6ff194861d316a 0x91a71f346e57e9a089e4dff01a54285646791689 0xcf3fa36e6d7df2e43b27b72d5ac50663ca519177 0xee2ce23107924bdada919a41c5b8f49548962d0e 0x88e77a5a802e7908e1c6768d258f0e5c289c2bc8 0x438d35838b9700e4da731ad3b1e6e16f8165b068 0xdbef7ff9ff557c7db804dd45c8715fffafc11803 0x22764f16b2500398f0a470011475a93cecba07a6 0x220a51e11626c263ad1d534d8093ab0ff6deaed9 0x1c2b9e785ded143e6941b717d65c115e65f16b2a 0x0f727a5ec0181811f484602e9468f42110905d8e 0x4b803bf36d8b338ee004d6e31b4cf14a0b936b48 0xc8b19f0561698171a8dbde2f52af6236cc467778 0xb9b7146fcc83b955a42e975a0d151f6c0aeef29f 0x8acf40644334d8315b3cf9779627dbd572ac2889 0xdc2bad1020dd58dd6a538212025abe96a49f5287 0xa830cbf82fb1e709bde17ff1c10f6eb3ca337a4d
