ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-F997F18B3892
|
Infrastructure Scan
ADDRESS: 0xd926cccad6a7075e02583a578876eca744fc9a43
DEPLOYED: 2026-05-14 09:49:23
LAST_TX: 2026-05-15 02:02:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Pulling contract state from Alchemy RPC… [FETCH] Hex dump completed. Entropy: 1.58 bit/byte. [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Snapshotting EVM state before execution… [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Call sequence: 9077 -> 1a18 -> 7e96. [VALID] No critical memory leaks during simulation. [DONE] Disconnecting from Ethereum node…
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x1007449721762ffd4099339a75db148ba92b54e1 0x013ba38673494c8fafcdb939a34bc4549580b962 0xb4ca9cfd6a6850ef7c97b5eedd98d35c240eb943 0xca349ba94e5d3e5b3f5bc79815fa0f1ae1ac4222 0x5643ba49795dc675c4e862e45c0af2d4ec97995d 0x2cd14bb5d81ea122121219702dddd91a54e091f2 0xd0d25bbf58aff8eae8c491067a23bd64cddfdf4a 0x3141b7c4f57fd3cb64beacd2ea069c65b7777533 0xe09d3d770057c5e6a1082daa892d6462f8637ed3 0xd05d62436632e48529b450eb3882a4de33c5bada 0xc9e6c094dc626712206e558768da8a886988c659 0xaaae8273e83d36837dc293279bcc22e63acf16ac 0x42be8ac38220376d4b182c55b3ded7d6e76ddebc 0xe4b1bfaabfacd76bf32cef5e3c12f35675d315c7 0xaf00a70ed18a260c4f8eba632b5a4ab67401a79d 0xfb860b370d230a18fb6d24e0be8868686d8485c6 0x1f85e598b1b86047e7fa4ae7e3e6e0d35eb712b6 0x431682168c5bf635fa6aa9bcd30d8064489378fa 0x7e38e3f5afaf8b1ef869cb8614a7a6ee99b083aa 0xad368f7d0c0df1c6c643b8ab42b99837fc26fd9d
