ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-E2D1D487C314
|
Infrastructure Scan
ADDRESS: 0x92d8a5f98373d87ab28f49292fefcb98a31c75a8
DEPLOYED: 2026-04-25 21:06:35
LAST_TX: 2026-04-26 00:05:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Running static analysis on JUMP instructions… [MEM] Simulation buffer: 1024 KB allocated. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Comparing result with Triada-Security-Standard. [DONE] Log signature: 8589b882c037d6a8fde1ac96b30def6452775e90e5d010b093dd27d9d4608eea.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xc8407d53182fef85abb4267ef8679aa1a36c0b18 0x40221815b9ddd667938dda53016949d48e237a09 0xe9f1e01404dc60e53d0ce6016c4dc503a1880aee 0xbab5e87d82bdd2d99ab76810690628cf7c196d7c 0x4566190f799d7645c00afff91be34403331db361 0x1a169cd0851df32663f1013dc679eb561b93c353 0x55e4836563a2ba7d2af3e03386b102aacd0ceb3d 0x10049350072fb8e7b2b3b46ee07d7e6d7d6e209a 0xd8a5c61b1d76be61d26c36fe99137b518490e883 0x85518bc4956cf1127032995276ed133ab57b2c76 0x3ec277fce9471933147d70315240dc934beba423 0x76f404ddcbc6e3ff466f983121cc2b0d8a63f4cb 0x74c15a5d584a1775ba4ef85fbc497bb930636d15 0xa1e5386801e8ceb100a923b8364a57a63623cb61 0xdeedadffba33c53ef1cf5e76692bac4f7b29c2f0 0x143c4862ffd659b07dd4a138a6f629d18d5a6f13 0x7d4cc03abb558c97fde6aa44202b011162d77a30 0x4641c824ae52dbd02a39bad9c45c5dbfb86a6a61 0xbc488af2cb0d6a390718e50ec2713859d266b56b 0x8e1a4f02077dc61c9fab061db79f2192beedd6d9


