ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-68C7B4BB2A4E
|
Infrastructure Scan
ADDRESS: 0x5a1cf33649535fdf3f3db33c64fedcf8212000bb
DEPLOYED: 2026-05-11 06:42:23
LAST_TX: 2026-05-11 07:14:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Synchronizing with block height 96796. [FETCH] Metadata hash (IPFS): 4953aae6…1659d6ea… [SCAN] Mapping internal logic flow and branching. [MEM] Garbage collector: 0.31ms since last run. [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Bytecode segment 0x5c analysed. [VALID] Comparing result with Triada-Security-Standard. [DONE] Report exported to IPFS: 4953aae6…1659d6ea.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x2e864f8dc6f9060f889256ab0d51f13367c51878 0x69c9431dbb4f439cdfd4b913c185565b4c3998fa 0x22d6b34f5c4bc323eacd59822f2844586f0bc70a 0x9971eddbff16f05297b2ab5599d24cb76775c5f1 0x9e68096675578cccf6eb7ad01350f731dde633ed 0x8d6fd908ee7366bb2262f43688dc6db1dfece3a1 0x4c1e00dba0c0ebbed1fedb66d028642dceb78929 0x84da65a1703d45b39ee81058895226d451af5c1b 0x3ea7ea642952526642dead65b9123e445448b4fa 0x3e12e505add32b392c0520b8f3f379d1ce92f56c 0xf6576e0d89aed6b04946d39fd828d6418282cf9c 0x0ef4d697f7e43c239a4ab4807c32ba3fe0de1150 0xf75b2718a0c12a9ab19e1972fdba7cccca3745c1 0xe8fc150195edf9340fedce9edc207fec004341fc 0x1920052cf0e4c5ebfed9c805c4f2d42d34a62c58 0x7052770f503c4ceb11cd6f209093d7e307c35d86 0xdace81e4fe97294a9050a322cbdd48c4c240ec34 0x29aa03ed6da5727b9e83acab46e374febbf790fb 0x4702356c0756368ca09bb1b389484d4a93b25ce5 0x67b2972f0947d434f0f3b166c8384f2c8e4b0816