ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-AD79F2531412
|
Infrastructure Scan
ADDRESS: 0x160960fe96d3d61d606c4ce5d39d0bb63758303a
DEPLOYED: 2026-04-29 16:23:11
LAST_TX: 2026-05-04 22:11:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Entry point found at offset 0xd128. [SCAN] Detecting compiler version: v0.8.79. [MEM] Clearing temporary registers for deep-trace… [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Program Counter (PC) synchronized at 6058. [VALID] No critical memory leaks during simulation. [DONE] Triada-Engine standby mode. Load: 4%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x6803d6aa602142d107787da1492d68e00b6ca100 0xa055e852bcb07353ae0d3f1748e6fd742fa95763 0x48ba16b56e72f1c352906bb0088f510e676dd8a6 0xc88cc9bfef43d40c47cdcc8199c23428a19b2477 0xd475a355a6dc3d7c691ad146286ff455e8037a14 0x6b1bf64b0876b941bf1e644bd36bfcf696eb4ff0 0x494bdd235d234138986093d735afe3e5b674fb28 0x5dbc7bdae6d882d88843aa6c96e037bb6ad4530b 0x9f137c68c51b04eb667924dfb9df828449853220 0x263820b810a4c78bd991b5e07d18f803a164984c 0xbf01705886271f8be6370f092874752d3f23ce1a 0xe6915b676a96e8983f30b43261c898431102433d 0xbd83a35a8765158a49dea54cbb42de606635eac8 0xad7ed12bbae4aa9b19f55a16d00496689eb3d074 0xf23183c22340bf5be499bef016e7f0292409d4ee 0xd553ce92054a8f5b5a3a0a41423c4c583ba9514d 0xeb98f2d0c40d259df61fb1a8bb16adcb52a8fbb0 0x6e7adb53e88305faa5d17b2850f33d989f368d4d 0x4a26a80ee4d8f3d6b13ce4f7bc0237f223e0e257 0x5c9e5e02c6f1f9b386fcfc6eeb7da4f33e091c7a