ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-CBC21EFBEBCE
|
Infrastructure Scan
ADDRESS: 0x591c040cbc9eb2401f17a1cc779ab240b7fea5f6
DEPLOYED: 2026-05-14 11:38:47
LAST_TX: 2026-05-14 12:20:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Latency: 75ms. Protocol: JSON-RPC 2.0. [FETCH] Received 80 segments of contract data. [SCAN] Detecting compiler version: v0.8.57. [MEM] Clearing temporary registers for deep-trace… [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Stack trace saved to /logs/TRD-DBE8CBB4.log. [VALID] Security status: DEEP_CORE scan finished. [DONE] Log signature: 61d4b9b10226d8c19178e44a02b5851b6a9bb28a7e19ee069bc4674e9e4f61f7.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xf8a5313815c93c14876079eb4475787d7187621f 0x0d8739c706bacb0c5b452f0ad2dd494d4c591ded 0x862375e8ea5a583acf6647c007cc81e8c68eb664 0x86c245d4413b6dfb2dec6858588e9a26483196c0 0x1db34f6c6692cf98e8a69d1491d807590a500bf8 0x6b005fb975fd3f6c243ac23f580f2fa00f161854 0x106f05c4ddb430821f152d93c0aedd450f412d7b 0xa720211d86e2c6fc288a901dfb957b5ac1ec3526 0xa7122c326a8b9cf133496f907d70d68d4e2fdd02 0xabb5c3e6010079b314dbc9386f81d1b4f3d677bd 0x628e2931e5e64b6b4306848c29e8764f023dc409 0x3ae585ed0e02d2b6fe930e640b0aa079ca0ac97d 0xfd9337ce8038be32a4460427166ce93994521240 0x7688a8d7eee1f8525f225aefec350a587861456d 0xe55ab6832df4b4f42348b9bf7f648538e0e55f29 0xc9bcc4722a53f4af6b5d4d55b167ccc7e1515d9f 0xdfc44b3f9da3f65b03ec478bc82d0a74f0e818c3 0x526636ca8c3e251885a5efe86fe9fecd8c9b76ba 0x780ae06a9a15b7a825a180f2b4cebdd232a37c73 0xd8a1ec263d08c0cb8236f07d0d10866abe6abe40