ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-66F0F256E534
|
Infrastructure Scan
ADDRESS: 0xe838b5fd8f4c9dd6ad6e73b3f69fb9dfd234fb1a
DEPLOYED: 2026-05-10 18:30:59
LAST_TX: 2026-05-10 19:22:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Fetching raw bytecode for 0xe838b5fd8f4c9dd6ad6e73b3f69fb9dfd234fb1a… [FETCH] Entry point found at offset 0x3a9e. [SCAN] Mapping ownership-protected functions… [MEM] Allocating stack frame for EVM simulation… [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Execution path: 96% coverage. [VALID] Finalizing audit report for 0xe838b5fd8f4c9dd6ad6e73b3f69fb9dfd234fb1a. [DONE] Triada-Engine standby mode. Load: 1%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x8a986f164c75ea9e5d6594d9929baad1677c42cd 0x5833556e8adaca6ea7f0a009e63ec960fdf26875 0x82ad863926c30c9c66d114fc6af5efa57aa21832 0x32a2e0604819525fb5172b9187a5f21643845a8e 0x63a62941cce0e4dcbba580202a2a2d3b66be43b4 0x30e49038fcd30f53527f2e2d83ef92ee677ba9c4 0x4842ed71fd6f8d5a1cb157c31902aec1b56643dc 0xb00a3b52d1d6c0e6c5f52618bdc5ba469cc94f7d 0x42bdac7d84523aa8d37452ab9625d025f6657122 0x47582b10d44fe8d60bcc2f736908ce84fef570f7 0x478d54c97dac863fd48fee599916e6cbe2788375 0x4051d02e7cf069b5a081b7322929fcda122a18c6 0x77b732ee0134bf5c05e86d173f952e43c71d915e 0x7c6a16351722b0d432b39b2cc82d933529630c71 0x814ae8ddd7195ba9c63fdb949a95b1f263edd67d 0x00c8274f2aa1d1cbbad42bbe72997cfd5204a0e9 0xa7e62acdd5122e8fcfbc4e03a8f41b24c4028d80 0x0ce5de9b4ea1380c2f929b31b97b3c4b4600afd0 0x8a5452bc886aebf1e28ad27588e6811505b91e3d 0xf8430081af99985de1a60dd9503b3ba64f30791f
