ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-49B62854ADCF
|
Infrastructure Scan
ADDRESS: 0x026cd530bf05bbfc09ecf961f51fc6f818ce3932
DEPLOYED: 2026-05-11 22:38:11
LAST_TX: 2026-05-15 09:09:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Handshake with node 0x825fef64 successful. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Mapping ownership-protected functions… [MEM] Garbage collector: 0.99ms since last run. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Comparing result with Triada-Security-Standard. [DONE] Scan task FA78A09F finished in 87s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xd8ad9165f70dd79b5cc4a9e51710e2c9e4c69c50 0xe21efe288cf64b8ceec71ebb455defc4743b0a7e 0x6d6ae9de136613277974a51a46007860fd088b73 0xba2732aaf7d8c00a6b919626a1fd89577c868c44 0xa3b244731aba303f6786f43f0f20c2d8a0b5affc 0x7077ec79613120f4d47444e3d450b5ab314c7de9 0x06bd8c8c1af4f983dfc78b15c3dcbe14b69b2626 0x46d6fe27da251d2210ce4a76dccaba7e092d35ef 0x7dcc5bb5b0e461d633f913a071b977dcaca82378 0x3a3845016aafd3f3dee34480379deca94b89a43c 0x695974469fcfd4448c59857808b60dd280f12e86 0xaabdb8b6aa30ba7da75743f1a65264c1e296f879 0x356df589b73f7a097f9029be3d387f3548478927 0x12b775d24aac786ebc15cb2c459be9c665231255 0xfa88e3002a00c8f4f462e67786f1b2e2076c9abb 0x1a9e561276a76bfa8d2f9356855760717856a310 0x24f1822e3ab4d4cbb529ce7d52dc39a7a9ec068d 0xc453457b4e332b03ff0faf0ca78fbdabe0351e8d 0xa3fa09686137595bbaeb66dfa5d7c1545d616cbd 0x3fe2acdcbc81383899ee376713494b06e5df0c97
