ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-5C14C3775FF6
|
Infrastructure Scan
ADDRESS: 0xf7fa7c280c17225845c71758c1adb866e7e878ff
DEPLOYED: 2026-04-24 08:51:47
LAST_TX: 2026-04-24 09:25:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Pulling contract state from Alchemy RPC… [FETCH] Successfully retrieved runtime code from blockchain. [SCAN] Running static analysis on JUMP instructions… [MEM] Simulation buffer: 1024 KB allocated. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Bytecode segment 0x42 analysed. [VALID] Consensus reached on node cluster: 8/10. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x97096fa7ab8685418f6851c92d481ab615ee4639 0x2e3ea7104772954ad387d7fd16b7d9a0b69eea29 0x936ef844be7314878273fb5aa4b0d33f4ab3ce1e 0x610bf38f42fa9b2418a8fff926991da664565c13 0x99caac56066c62d8910c91c1de4bdd78b63f58e9 0xb1fa7ffde96c5fbb391bfcdf09782294d3274a43 0x32fb3b9dc2ff46af461f1031c94d9b7c449b210c 0x17229f8ca5cc4f8e5d9188ea99a679a5c4e17777 0xa464df2ac8018e9739e8709c9926f7d64dd203d6 0x4eb106c44ddda28001ea9b5a3a6d7835546fc53a 0xe729e40e91f891a343ac1de3ddead1de1f586640 0xf3e074befb98c5bdc3eb9f9d4d00ae794f76601f 0x4378b3474f74b02dadb34566775568c9c0b343e6 0x1547dbff5d452a653f011e6495526352340ec99b 0xdcfb21798b450af02ca760c8473f476ccd876d82 0xfd167731dde599ed13993e216d375a5722d72c06 0xc9e045a10d91a38e98c393e3d4a3923ea21bdde3 0x12536c36f50b482f8e9ac4facf70495861b3232d 0xd8f32d42e5acfb4310aff34e4c28e19f157c780e 0x232e331018e1c22be71f22348b4f97f5030f4b81

