ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-4E4586E69A7B
|
Infrastructure Scan
ADDRESS: 0x654ce74b131c969656374e9f863931b155e17a4a
DEPLOYED: 2026-05-06 12:20:59
LAST_TX: 2026-05-07 21:15:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Mapping peer nodes for transaction trace… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Checking ‘immutable’ variables and constants… [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Stack trace saved to /logs/TRD-2FD8E65B.log. [VALID] No critical memory leaks during simulation. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x235f7326d0f1c0d0945af892fa775d099501d7a9 0x0435ac3b87e08d31848626a42470c76da2143944 0x58ca6eccb3aac8263a423e8955e4c6bbb3f0e1ea 0xca5d85eaf70a6f1c509006d745292a20f0011c0e 0x8d1dc9f3e2561dde0aac846332236b626c04c627 0xad24b42610521bdf8547be582c16f65ceebbade0 0x68ffcef7dfdfaf70f593183c9acb88cd7887c75a 0xb7c49e3ba3317b4747effb63776cc6e180ad9b71 0xcd7db432464cb8d13b06a247c458d81b0327418c 0xb01cf4630b10d5f0a593c630bb184ae5b497a509 0x11cb2a2df68b3b975936d54ede43945c673a62d9 0xee6c3d4f2f1163d5bec9a5e310b93eab66e5994a 0x493c164fad1f87af0a3fa00a4bd6d5e9b5b55480 0xdc3c71326181cd3f8a55f20d7a88b081c4a68c5a 0xe7d20ee05b49bbe2378e2741bc59b07984ff38b8 0x20c78882e68726a6d71707436fc16a4a38cba258 0x4e52f2972096c774c3e73b96b9b7b0223e68f422 0x8140f01cb51bc81667acd7f58c5c97e5064cce86 0x815adc8399794e1b65af5ecd47e8c6e59f217c89 0x0722bfd08f52b14c196a67a5559e211b43846213
Post Views: 12





